/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:40:32 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) [ 886.256929][ T9190] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 886.282514][ T9209] FAULT_INJECTION: forcing a failure. [ 886.282514][ T9209] name failslab, interval 1, probability 0, space 0, times 0 [ 886.333953][ T9209] CPU: 1 PID: 9209 Comm: syz-executor.1 Not tainted 5.0.0+ #16 [ 886.341519][ T9209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.351574][ T9209] Call Trace: [ 886.354873][ T9209] dump_stack+0x172/0x1f0 [ 886.359218][ T9209] should_fail.cold+0xa/0x15 [ 886.363831][ T9209] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 886.369652][ T9209] ? ___might_sleep+0x163/0x280 [ 886.374554][ T9209] __should_failslab+0x121/0x190 [ 886.379511][ T9209] should_failslab+0x9/0x14 [ 886.380420][ T9347] kcapi: manufacturer command 1 unknown. [ 886.384023][ T9209] kmem_cache_alloc_node_trace+0x270/0x720 [ 886.384039][ T9209] ? kfree+0x173/0x230 [ 886.384055][ T9209] ? kvfree+0x61/0x70 [ 886.384067][ T9209] ? kfree+0x173/0x230 [ 886.384083][ T9209] ? lockdep_hardirqs_on+0x418/0x5d0 [ 886.384103][ T9209] __kmalloc_node+0x3d/0x70 [ 886.384121][ T9209] kvmalloc_node+0xbd/0x100 [ 886.384142][ T9209] seq_read+0x3f2/0x1130 [ 886.393813][ T9190] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 886.395582][ T9209] __vfs_read+0x8d/0x110 [ 886.395595][ T9209] ? seq_dentry+0x2d0/0x2d0 [ 886.395612][ T9209] vfs_read+0x194/0x3e0 [ 886.395633][ T9209] ksys_read+0xea/0x1f0 [ 886.451281][ T9209] ? kernel_write+0x120/0x120 [ 886.455951][ T9209] ? do_syscall_64+0x26/0x610 [ 886.460620][ T9209] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 886.466692][ T9209] ? do_syscall_64+0x26/0x610 [ 886.471372][ T9209] __x64_sys_read+0x73/0xb0 [ 886.475912][ T9209] do_syscall_64+0x103/0x610 [ 886.480534][ T9209] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 886.486424][ T9209] RIP: 0033:0x457f29 [ 886.490324][ T9209] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 886.509927][ T9209] RSP: 002b:00007f339387ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 886.518329][ T9209] RAX: ffffffffffffffda RBX: 00007f339387ec90 RCX: 0000000000457f29 [ 886.526376][ T9209] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 00:40:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4000) [ 886.534345][ T9209] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 886.542310][ T9209] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f339387f6d4 [ 886.550285][ T9209] R13: 00000000004c4b58 R14: 00000000004d8580 R15: 0000000000000004 00:40:32 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) 00:40:32 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x4000000b, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:32 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) socket$inet_sctp(0x2, 0x5, 0x84) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$VT_ACTIVATE(r1, 0x5606, 0x32) 00:40:32 executing program 1 (fault-call:3 fault-nth:3): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x0) [ 886.662468][ T9392] kcapi: manufacturer command 1 unknown. [ 886.739787][ T9444] FAULT_INJECTION: forcing a failure. [ 886.739787][ T9444] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 886.752999][ T9444] CPU: 0 PID: 9444 Comm: syz-executor.1 Not tainted 5.0.0+ #16 [ 886.760546][ T9444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 886.770595][ T9444] Call Trace: [ 886.773910][ T9444] dump_stack+0x172/0x1f0 [ 886.778356][ T9444] should_fail.cold+0xa/0x15 [ 886.782951][ T9444] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 886.788774][ T9444] ? percpu_ref_tryget_live+0xef/0x290 [ 886.794738][ T9444] should_fail_alloc_page+0x50/0x60 [ 886.799941][ T9444] __alloc_pages_nodemask+0x1a1/0x7e0 [ 886.805317][ T9444] ? find_held_lock+0x35/0x130 [ 886.810412][ T9444] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 886.816152][ T9444] cache_grow_begin+0x9c/0x860 [ 886.820928][ T9444] ? __kmalloc_node+0x3d/0x70 [ 886.825615][ T9444] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 886.831893][ T9444] kmem_cache_alloc_node_trace+0x658/0x720 [ 886.837718][ T9444] ? kfree+0x173/0x230 [ 886.841816][ T9444] ? kvfree+0x61/0x70 [ 886.845818][ T9444] __kmalloc_node+0x3d/0x70 [ 886.850345][ T9444] kvmalloc_node+0xbd/0x100 [ 886.854860][ T9444] seq_read+0x3f2/0x1130 [ 886.859123][ T9444] __vfs_read+0x8d/0x110 [ 886.863374][ T9444] ? seq_dentry+0x2d0/0x2d0 [ 886.867885][ T9444] vfs_read+0x194/0x3e0 [ 886.872044][ T9444] ksys_read+0xea/0x1f0 [ 886.876236][ T9444] ? kernel_write+0x120/0x120 [ 886.880921][ T9444] ? do_syscall_64+0x26/0x610 00:40:32 executing program 4: ioctl$UI_SET_SWBIT(0xffffffffffffffff, 0x4004556d, 0xf) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) write(r0, &(0x7f0000000100)="429142e16afe3dd763162c3fd9a752b1643e70accd0d58456b01924ae290cbb364df2c625a60ec8c09bc49467b2ad003aea1e66191b775bf9a72966b1fd006885119808fd0b45de93c6666bb414a23c4442c50534f78bbbb8ba304f86b3af2804ae9f40037534abdffe29d40b82283594de07ef811bcd052ae1936f637defa45c43838c2fc10a229e3af3d713d07ac99377257e5bdc1ec1db8166f236693491fea62b1aa521905dc2de597c9fa410819a0f00b9966e8f7aaacd43d174cc9e1d2213c407fdae73f9ba0a2e20d38ad94f925ecfa52ebf5bf5e7b9f2525a52db7", 0xdf) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000400)='/dev/sequencer2\x00', 0x40, 0x0) bind$ax25(r3, &(0x7f0000000440)={{0x3, @default, 0x2}, [@bcast, @bcast, @bcast, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}]}, 0x48) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000340)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$VIDIOC_QUERYCAP(r4, 0x80685600, &(0x7f0000000380)) delete_module(&(0x7f0000000200)='GPLem0(eth0\x00', 0x200) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r5 = openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x1, 0x110) ioctl$GIO_SCRNMAP(r5, 0x4b40, &(0x7f0000000240)=""/197) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:32 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) fcntl$getownex(r1, 0x10, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) madvise(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x3) ioctl$UFFDIO_COPY(r1, 0xc028aa03, &(0x7f0000000040)={&(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ff8000/0x8000)=nil, 0x4000, 0x1}) 00:40:32 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) [ 886.885612][ T9444] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 886.891723][ T9444] ? do_syscall_64+0x26/0x610 [ 886.896409][ T9444] __x64_sys_read+0x73/0xb0 [ 886.896426][ T9444] do_syscall_64+0x103/0x610 [ 886.896445][ T9444] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 886.911574][ T9444] RIP: 0033:0x457f29 [ 886.915461][ T9444] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:40:32 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4800) 00:40:32 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r2 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') sendmsg$IPVS_CMD_DEL_SERVICE(r1, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0xd0, r3, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'syzkaller0\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x50, 0x3, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8}, @IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @local}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x5}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x80000000}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xbb}, @IPVS_CMD_ATTR_DAEMON={0x38, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @multicast1}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'batadv0\x00'}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}]}, 0xd0}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) r4 = socket$inet_udp(0x2, 0x2, 0x0) r5 = add_key(&(0x7f0000000440)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="6f36e83bbd1e8e73016f0c1f38211f791d085aff7a7b6ff1ed96e470ed76a5b8bea9259d1e02b976a86cb673341f8b9aa5842a6b0f1a923c695e35d5c49c3ff4a6de642735611bd2ebecd9fa19ce31aa751abda53ad09fcf23a91413a718ad2021f056b0ab0fadb8653b0349f0c1042b868411c41b41fa24957fea83118dcc9f6b22b8d15324ec0be0109c2fb73f8be7", 0x90, r2) add_key(&(0x7f00000002c0)='encrypted\x00', &(0x7f0000000300)={'syz', 0x0}, &(0x7f0000000340)="8e5f9f59b6e03590ff8e967a739e312b238c6cd6f166c689cafca03cbf9ecb5737dffdc73b42266c5653a1ae4a275b84ae856237ade2f6c59f96b045ef43b04e5944e0e61e3c8c1d986899f8bdbb6a33c4bceccc8e7ba4aa48997d7b804f992da225ad7f386b153b358ede87be54af7863a0ed74955c596f41af557fee463ea07b5253b62a750bd5b1af6c5cb62203d6e80e5f6426cebd5614fb1208e6bd81b04039342cfdebb8c7a44de40d441ed36b8b826d26a43886dad73d83e44f44f633b20813adb8b05e094c6550ed1bc48a50ed69936e651bbdea534377ae34e1ae25445e3ff7b7bbdc67b5cbe18860fee35084bf543ed2ae", 0xf6, r5) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 886.935101][ T9444] RSP: 002b:00007f339387ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 886.935126][ T9444] RAX: ffffffffffffffda RBX: 00007f339387ec90 RCX: 0000000000457f29 [ 886.935134][ T9444] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 886.935142][ T9444] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 886.935149][ T9444] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f339387f6d4 [ 886.935157][ T9444] R13: 00000000004c4b58 R14: 00000000004d8580 R15: 0000000000000004 [ 886.955637][ T9616] kcapi: manufacturer command 1 unknown. 00:40:33 executing program 1 (fault-call:3 fault-nth:4): r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x0) 00:40:33 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) 00:40:33 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000440)='/dev/vga_arbiter\x00', 0x8000000000000004, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') setsockopt$TIPC_GROUP_LEAVE(r2, 0x10f, 0x88) sendmsg$TIPC_NL_NET_GET(r2, &(0x7f0000000340)={&(0x7f0000000100), 0xc, &(0x7f0000000300)={&(0x7f0000000480)=ANY=[@ANYBLOB="54010000", @ANYRES16=r3, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x800}, 0xc0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:33 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000f00)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x000\x90\x9cg\xda\xa1\xe3\xe1\xe6\xc2\xd2\x86\xf0\x81\xc29\x19\x15}\xd7\x16\xd8\x12V \xbf\x0e\xa4\xa5\x00\xbd\x86\x15r@L\xbe\x93\x8d\xf7\xd4\xc2\x9b\x1f\xe3\x8c\xd8\"\x92\xb1\xfcN(\x84\xc1\x94\xbb\xfa\x9c\xb8\x7fR;\xd7\x80o6G \xdd\"\xf3\xa4\x9f\xc8\x940\x16\xdeO\x91\x17v\xbec\xad\xe9\xa0i%J\xf6\x9ebr\x83\xe52fQQ\xd6x\xe0\xc8\xd5M\x8e\xc6\xbe\xd3\xed>\xf7\rZ\xed\x86\x05J\xe2\xb3\v;\xf4\xd9\xb9\x8b\xa0+\x16\x16\x10\xb8\xfd\"\xe8a\xd6\xba\xcc\xd5I\xe4\x82K1tl\x7f\x8b0x0}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000180)={r2, &(0x7f0000000140)=""/32}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:33 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000001c0)={0x18, 0x31, 0x829, 0x0, 0x0, {0x2802}, [@nested={0x4}]}, 0x18}}, 0x0) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(0xffffffffffffffff, 0x84, 0x1b, &(0x7f0000000200)={0x0, 0xb3, "8fe8f976905f958622ced2f20db50400d7e40887b0b37d11217018c7328deb227b6d9c7cf24575b07acb9dc4583544710b64c072f8c9ac53b952c2720764ccfc6bfcc1b9447f54afef775b551c409793c1ca8682f8fe95fa2ec3050151db9fa9e2fe868ca525b98f4f7de539cb92911f09d3dd416402ba616eb0ab44717b0b21b95f7baaf738a6b263982930351bf49ab369f8d3628f040b40a92d376b9754eb8918fd4b870ff6e67c24f3738c61dc3fc6bdc2"}, &(0x7f0000000140)=0xbb) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f00000002c0)={r3, 0xba}, 0x8) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x9, r0, 0x0, 0x1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$IOC_PR_RESERVE(r4, 0x401070c9, &(0x7f0000000040)={0xc000000000, 0x8000, 0x1}) 00:40:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x0) 00:40:33 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ioctl$UFFDIO_UNREGISTER(r1, 0x8010aa01, &(0x7f0000000040)={&(0x7f0000ffc000/0x2000)=nil, 0x2000}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 887.345346][ T9756] kcapi: manufacturer command 1 unknown. 00:40:33 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) 00:40:33 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:33 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:33 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5800) 00:40:33 executing program 4: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000180)='/dev/autofs\x00', 0xb0800, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r0, 0x84, 0x65, &(0x7f00000001c0)=[@in6={0xa, 0x4e24, 0x101, @ipv4={[], [], @dev={0xac, 0x14, 0x14, 0x16}}, 0x5fb2}, @in6={0xa, 0x4e20, 0x4, @loopback, 0x9}, @in={0x2, 0x4e23}, @in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xb}}, @in={0x2, 0x4e21, @broadcast}], 0x68) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000280)={0xa, 0x0}) ioctl$TIOCSCTTY(r0, 0x540e, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r1, 0x400c6615, &(0x7f0000000140)) r3 = syz_open_dev$sndpcmp(&(0x7f00000000c0)='/dev/snd/pcmC#D#p\x00', 0x2, 0x800) ioctl$ASHMEM_GET_NAME(r3, 0x81007702, &(0x7f0000000100)=""/54) setsockopt$inet6_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f0000000240)={0xfffffffffffffffd}, 0x4) ioctl$DRM_IOCTL_MODESET_CTL(r0, 0x40086408, &(0x7f0000000000)={0xe165}) 00:40:33 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) 00:40:33 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x218000, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) write$eventfd(r2, &(0x7f00000001c0)=0x100, 0x8) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:33 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2) 00:40:33 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000100)={0x8000, 0x0}) [ 887.801446][ T9987] kcapi: manufacturer command 32768 unknown. [ 887.846775][ T9987] kcapi: manufacturer command 32768 unknown. 00:40:36 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) sendto$unix(r1, &(0x7f0000000140)="2eed23d1326ccebf9ad408668b10572fbdb03db77ac66d9b873ecbe24f69fc7f45146166b28b9663bdd0f05ea561a003cd431ced9043a0ea531ff3175f4a5ccdcce550b2", 0x44, 0x4, &(0x7f00000001c0)=@file={0x0, './file0\x00'}, 0x6e) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$cont(0x7, r0, 0x9, 0x2) ptrace$setregs(0xd, r0, 0x6, &(0x7f0000000040)) write$eventfd(r1, &(0x7f0000000040)=0x5, 0x8) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3) 00:40:36 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(0xffffffffffffffff, 0xc0104320, &(0x7f00000001c0)={0x1, 0x0}) 00:40:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000080)={@initdev, 0x0}, &(0x7f0000000140)=0x14) ioctl$sock_inet6_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000180)={@loopback, 0x2e, r2}) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6800) 00:40:36 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/audio\x00', 0x210000, 0x0) recvfrom$inet(r1, &(0x7f0000000100)=""/246, 0xf6, 0x10002, &(0x7f0000000200)={0x2, 0x4e21, @empty}, 0x10) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000280)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:36 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) 00:40:36 executing program 3: syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x1, 0x20100) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) mkdir(&(0x7f0000000700)='./file1\x00', 0x0) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() lsetxattr$trusted_overlay_opaque(0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1/file0\x00', &(0x7f0000000080)='system.posix_acl_access\x00', &(0x7f0000000140)=ANY=[@ANYBLOB="02933b29ee88406d0000000100000000", @ANYRES32=0x0, @ANYBLOB="04010000fdb3b453502472fd779302e26859abbc34d14b126e55", @ANYRES32=0x0, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=0x0, @ANYBLOB="10000200000000002000020000000000"], 0x3c, 0x3) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x9, r0, 0x0, 0x0) 00:40:36 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0)='/dev/snd/pcmC#D#c\x00', 0x3, 0x180) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000100)={0xa, 0x0, 0x800, 0x1f}, 0xa) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4) 00:40:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r1, &(0x7f0000000040)={r1, r2, 0x3}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$KVM_GET_TSC_KHZ(r1, 0xaea3) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:36 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000080)={'vcan0\x00', r2}) pipe(0x0) tkill(r0, 0x4) r3 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vfio/vfio\x00', 0x204080, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$BLKALIGNOFF(r3, 0x127a, &(0x7f0000000180)) 00:40:36 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6c00) 00:40:36 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x10000062) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5) 00:40:36 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) 00:40:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r1, 0x114, 0xa, &(0x7f0000000040)={0x3, ');\"'}, 0x4) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:36 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0xf4, 0x4000000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 890.850137][T10162] irq bypass consumer (token 0000000065628807) registration fails: -16 00:40:36 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() getrusage(0x0, &(0x7f0000000140)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:36 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, 0x0) 00:40:36 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6) 00:40:37 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/capi20\x00', 0xfffffffffffffffc, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0x40, 0x0) getsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000100), &(0x7f0000000140)=0x4) r3 = syz_init_net_socket$netrom(0x6, 0x5, 0x0) ioctl(r3, 0x101, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'batadv0\x00', 0x0}) setsockopt$netrom_NETROM_T1(r2, 0x103, 0x1, &(0x7f0000000180)=0x100000000, 0x4) connect$packet(r1, &(0x7f0000000240)={0x11, 0x13, r4, 0x1, 0x3f, 0x6, @random="a90254032a5d"}, 0x14) 00:40:37 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) capset(&(0x7f0000000080)={0x19980330, r0}, &(0x7f0000000140)={0x2, 0x7fffffff, 0x0, 0x7, 0x5e4, 0x1}) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:40:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7400) 00:40:37 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x0, 0x0}) 00:40:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4205, r0, 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001280)='/dev/dlm-monitor\x00', 0x600001, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001300)={{{@in6=@dev, @in=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@local}}, &(0x7f0000001400)=0xe8) stat(&(0x7f0000001440)='./file0\x00', &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = accept4(0xffffffffffffff9c, &(0x7f0000001500)=@vsock={0x28, 0x0, 0x0, @my}, &(0x7f0000001580)=0x80, 0x80000) getresuid(&(0x7f00000015c0), &(0x7f0000001600)=0x0, &(0x7f0000001640)) sendmsg$nl_netfilter(r1, &(0x7f0000001b00)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x1160000}, 0xc, &(0x7f0000001ac0)={&(0x7f0000001680)={0x428, 0x0, 0xd, 0x310, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x5}, [@nested={0x120, 0x2b, [@generic="5fb81cd077d2b05a565966d6679412c11099f37ca54db75928f404e767560cc787809cc70a37b48a9371948957f0cbb19331920e3cb2fa269af6c9204b9e53f9671b70ca6cf075eb86b44f9698553a88a25d77ecc4073ad2c9eac5ce365dd981d0d25230adf681f1fe23fe81ba7a245a4cbe418843c38303a72e3e", @typed={0x8, 0x92, @pid=r0}, @typed={0x8, 0x59, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}, @typed={0x8, 0x1e, @uid=r2}, @generic="cac03ed93fa7aeca8cead5a678b80fbca56175b7e20a78c51a5f63337db1f096d65d95d0d4020e", @typed={0x8, 0x3f, @u32=0x7}, @generic="fb55247cf500717c663c8f327118e10748004644aafa532fbc009275eda283f76bd416249aa1d1c3ecf04e64bf53d2bdf5de5d3308a70abc272bec3bb821c4d6ccfc030611424f4f8259eca8ac8dad6c630dc0e24f65341082"]}, @typed={0x8, 0x92, @uid=r3}, @nested={0x2c4, 0x85, [@typed={0xc, 0x87, @u64=0x8000}, @generic="6cf4a20f74f448a9c8e2f1eb884a1016c6c2daa88464b250ffa03bf8dd0faae5ce4d8687828259af8387f1c7e9709f55579805c8d596a96a8f93aa85407ba8d8c91be662e4503d162139625583a270f96c3754e0355a718ea73982cf8a6c67215f189b", @typed={0x8, 0x91, @ipv4=@broadcast}, @generic="f4dcab180572db3218bac153296d959180b3d60525627189565df68c393f82b3", @generic="a462687668bd8d1c66f0e1a8e3e6b76be9207e88b5e5f8a15d95395aa35a189f97465ce0e202f432e2d09807e5206ff6b0e1b76890ce8359eb770bfe9384124a3ec17f8e464650d13119c59f5d4e2f36c15265e3ad1db3a054418f9abb5039d7dfdf46c40fa143546cb8a0e59f4a806406ad0c012410725ad9f2e57018f68814a4fd4c38747976237e9787c311ed5cd071a4b050a3f8075669a87c9a5bbad43bd6181aaeea0b294f3ed635a78f2a62f08da4cc064310637dd871299e59ba1a0961650ab83b7b8520970be5337c6fde831fde4c0bc975b5d6d46c6d90a680aa20fe", @generic="ea68c2c87931859537bd2d19c296035eef88b9019acf5866063855286abcd52a3438c81cf500610a43f2edf088522cf4603d6305d476ac8709589e997562e698e7181976534d2b0fb7392aeda2a6e9a8b2bef43c33ec064dcc817991cf194f1063e5f3ff4fece98765cf1344bc57a286d6468c957c2b6df45c5ee1a42464d55d4f8234d83af6125387ac9e9d9633", @generic="eeff775c13c35d0ccb37bc1d2871e3ce2014796b1b4134f271e230c131abb89c81395872e3cc97468298a3038ebf52a48a30796e31b2717cd933dd1a0515fae2a584654ad6be26ffff2c289538bc15f11c4d8e5711d59593fcca8ffeaa0ed29a2d660e6ba722acf6571862e7d12f4bab046e92e67e523cde2d082ca25741b515dc2fab381986dd2e3d8603af6b0093f19a0dfa7d43a82182ed9b3979a8d3f664968d4bbf66f9cd4197d2234afae1d42ee20ded723c970ba0a4"]}, @typed={0x8, 0x54, @u32=0x20000000}, @typed={0x8, 0x36, @str='\x00'}, @typed={0x8, 0x93, @fd=r4}, @typed={0x8, 0x2e, @uid=r5}, @typed={0x8, 0x4d, @pid=r0}]}, 0x428}, 0x1, 0x0, 0x0, 0x1}, 0x0) r6 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/lblcr_expiration\x00', 0x2, 0x0) setsockopt$inet6_opts(r6, 0x29, 0x3f, &(0x7f0000000040)=@fragment={0x3b, 0x0, 0x1d9a, 0x3, 0x0, 0x7fffffff, 0x67}, 0x8) ioctl$sock_inet6_tcp_SIOCATMARK(r6, 0x8905, &(0x7f0000000080)) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) iopl(0x6) recvfrom$ax25(r6, &(0x7f0000000200)=""/4096, 0x1000, 0x0, &(0x7f0000001200)={{0x3, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x0}, 0x5}, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x2}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast]}, 0x48) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0x1000000000011, r0, 0x7, &(0x7f0000000140)="014b1a40f40d65240265efedfb5560cc9b236fb38e17da749213c31ddc6f76ef3b7f91a587444ba561143af8241473420f4e1dd225d4d07784ac3c53fa55b5943e09fc57999d20fb2c50352ffbb9e548128d00bb5a08e533befe211e76d149270d67cc953c8cce8e83ff56a4dd3574a60d06002a6100000000000000000000000000") socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0xfffffffffffffffd) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7) 00:40:37 executing program 4: chroot(&(0x7f00000000c0)='./file0\x00') r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0xe4, 0x1}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:37 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x0, 0x0}) 00:40:37 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) setsockopt$bt_BT_SNDMTU(r1, 0x112, 0xc, &(0x7f0000000040)=0xfff, 0x2) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9) 00:40:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/exbire_nodest_\xa3onn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a00) 00:40:37 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) accept4(r1, &(0x7f0000000040)=@isdn, &(0x7f0000000140)=0x80, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_GET(r0, &(0x7f00000002c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x48000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c010000", @ANYRES16=r2, @ANYBLOB="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"], 0x12c}, 0x1, 0x0, 0x0, 0x48041}, 0x40000) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r3 = syz_open_dev$amidi(&(0x7f0000000300)='/dev/amidi#\x00', 0x100000000, 0x50100) accept4$vsock_stream(r3, &(0x7f0000000340)={0x28, 0x0, 0x2710, @my=0x0}, 0x10, 0x80000) 00:40:37 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f00000001c0)={0x0, 0x0}) 00:40:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000040)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa) 00:40:37 executing program 5: chroot(&(0x7f00000000c0)='./file0\x00') r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/sys/net/ipv4/vs/ignore_tunneled\x00', 0x2, 0x0) ioctl$VIDIOC_REQBUFS(r2, 0xc0145608, &(0x7f0000000140)={0xe4, 0x1}) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:37 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r2 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e22, @loopback}}, 0x7ff, 0x5, 0x8c9, 0x6, 0x99}, &(0x7f00000001c0)=0x98) setsockopt$inet_sctp_SCTP_CONTEXT(r2, 0x84, 0x11, &(0x7f0000000200)={r3}, 0x8) 00:40:37 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdb23) 00:40:37 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400004001f6) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 2: openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/pmtu_disc\x00', 0x2, 0x0) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) syz_open_dev$binder(&(0x7f0000000040)='/dev/binder#\x00', 0x0, 0x802) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x10000062) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:37 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x10) 00:40:37 executing program 3: socket$caif_seqpacket(0x25, 0x5, 0x1) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x800, 0x0) getsockname$ax25(r1, &(0x7f0000000140)={{0x3, @bcast}, [@rose, @rose, @rose, @rose, @default, @default, @bcast, @netrom]}, &(0x7f0000000080)=0x48) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) syz_open_dev$vcsn(&(0x7f0000000700)='/dev/vcs#\x00', 0x3, 0x18002) accept$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000300)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r2, 0x29, 0x23, &(0x7f0000000340)={{{@in6, @in6=@ipv4={[], [], @dev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) sendmsg$nl_route(r2, &(0x7f00000006c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000480)=@ipv4_delroute={0x1ec, 0x19, 0x228, 0x70bd27, 0x25dfdbfb, {0x2, 0xb4, 0x10, 0x101, 0xff, 0x3, 0xff, 0xc, 0x2200}, [@RTA_IIF={0x8, 0x1, r3}, @RTA_SRC={0x8, 0x2, @dev={0xac, 0x14, 0x14, 0xb}}, @RTA_MARK={0x8, 0x10, 0x3}, @RTA_DST={0x8, 0x1, @empty}, @RTA_DST={0x8, 0x1, @remote}, @RTA_MULTIPATH={0xc, 0x9, {0xffff, 0x4, 0x7fff, r4}}, @RTA_PRIORITY={0x8}, @RTA_METRICS={0xb8, 0x8, "afb7759f60ab1cab6b94776770ac2661a2080f8a9323e29e3190355d12da8a650cb274ea5dbfe089766b5c226b0e83c0559e7a9d387a67da4961ad4f33eca747105594dc74003d8581c352ecfd091cdc5ea3c63f529ce5879bd41d81035eeb5c32d2424ff450e510668176c4c38cc74cb5c4248a585a769b955584f09c479f0bfa9b7f072e693007f45292df81ab56070913359fdacb83fff36695383a5a046a30337de54b1e88c644eb90da56eb493659"}, @RTA_METRICS={0xd4, 0x8, "5a5b972a791b903d125f2a026c58f0dbfb4b9c70266f8cec938a34592088f9e7c6d45b964b373d4ee3ae80530eca36c260019e05407a688e648644b7c7d81764ab782ec7900e14ba3f8a30a10b8dbd9e1437aeeae3f5df899be60325640a8fb0017a59135fd372bd2477d8e8a0ce7791f8533aea2f5fa4ddda841f2ebb2498e0913fc1bc276d68fba5cb1df6aa0cc3d142d2f0a4f96453afe63997f12aca37eebd413ecad045dcbd5e49cff540b01d6345c390eeb9497af77877d08fd79fec5a0dfbd9b5330f44b1511f4bd97c"}, @RTA_PREFSRC={0x8, 0x7, @loopback}]}, 0x1ec}, 0x1, 0x0, 0x0, 0x20000880}, 0x20000080) ioctl$VIDIOC_G_MODULATOR(r2, 0xc0445636, &(0x7f0000000200)={0xdf8, "6a714cc6d96351799c0570f40931ada6daf77372a47a6d1a17be0788cf22a8c2", 0x10, 0x6, 0x0, 0x0, 0x5}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BLKALIGNOFF(r2, 0x127a, &(0x7f00000001c0)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x29, r0, 0x3, 0x0) 00:40:37 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x100, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000140)={r0, r1, 0x0, 0x29, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0xffffffffffffffff}, 0x30) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:37 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x141042, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x400000, 0x0) r3 = accept$inet(r2, &(0x7f00000000c0)={0x2, 0x0, @broadcast}, &(0x7f0000000180)=0x10) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r3, 0x84, 0x16, &(0x7f0000000200)=ANY=[@ANYBLOB="e532b6ea9e17caf494ad4924c4dbf70aa1b2f2dc3e2341bc00001450f661a3e4660000000000a6"], 0x6) write$cgroup_subtree(r2, &(0x7f0000000100)={[{0x2f, 'memory'}]}, 0xfffffffffffffe72) 00:40:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x48) 00:40:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1c2167) 00:40:38 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x10000062) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0xfffffffffffffffe) 00:40:38 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x2, 0x2) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000180)={0x0, @in={{0x2, 0x4e21, @empty}}, 0x3, 0x10001, 0x3912, 0x2, 0x80000001}, &(0x7f0000000240)=0x98) setsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000280)={r2, 0xffff}, 0x8) ioctl$VIDIOC_TRY_DECODER_CMD(r1, 0xc0485661, &(0x7f0000000100)={0x7, 0x1, @stop_pts=0xffffffff}) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0xffffffffffffffff, r0, 0x4, 0x20000000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4c) 00:40:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) getsockopt$TIPC_IMPORTANCE(r1, 0x10f, 0x7f, &(0x7f0000000040), &(0x7f0000000080)=0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:38 executing program 5: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = eventfd(0x10000062) ioctl$KVM_IRQFD(r3, 0x4020ae76, &(0x7f0000000000)={r4}) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:38 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) pipe2(&(0x7f00000001c0)={0xffffffffffffffff}, 0x4000) write$P9_RREAD(r2, &(0x7f0000000200)={0x60, 0x75, 0x1, {0x55, "2b5302bbe4dbd1aea5ca518ec3fbc01b518ea2cd44fa2bf2fc45b5418794b519d0235513ddfc5135d607c2dec623cb3de7d34fe44cf54bb7935771c51718e2d44b062cf5569d109450daac507c182d2b6805e93de8"}}, 0x60) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(0xffffffffffffffff, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x7fff}, &(0x7f0000000100)=0x8) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f0000000140)={r3}, &(0x7f0000000180)=0x8) 00:40:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(0x0, 0x4) ptrace$cont(0x18, 0x0, 0x0, 0x0) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000140)={0x3, 0x4, 0x4, 0x80000, {}, {0x1, 0x3, 0x5, 0x0, 0x75e, 0x6c, "7e1ef5fc"}, 0x0, 0x7, @planes=&(0x7f0000000040)={0xfffffffffffff801, 0x7, @fd=r0, 0x254}, 0x4}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, 0x0, 0x0, 0x0) 00:40:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x41619d) 00:40:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) process_vm_readv(r0, &(0x7f00000023c0)=[{&(0x7f0000000040)=""/90, 0x5a}, {&(0x7f00000021c0)=""/188, 0xbc}, {&(0x7f0000002280)=""/162, 0xa2}, {&(0x7f0000002340)=""/71, 0x47}], 0x4, &(0x7f0000002780)=[{&(0x7f0000002400)=""/155, 0x9b}, {&(0x7f00000024c0)=""/202, 0xca}, {&(0x7f00000025c0)=""/167, 0xa7}, {&(0x7f0000002680)=""/204, 0xcc}], 0x4, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$KVM_SET_NESTED_STATE(r1, 0x4080aebf, &(0x7f0000000140)={0x1, 0x0, 0x2080, {0x5000, 0x0, 0x1}, [], "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", "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"}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:38 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = dup(0xffffffffffffff9c) setsockopt$inet6_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040), 0x4) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:40:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x68) 00:40:38 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:38 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = accept(0xffffffffffffff9c, &(0x7f0000000100)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x80) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f00000001c0)={'TPROXY\x00'}, &(0x7f0000000200)=0x1e) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$DRM_IOCTL_IRQ_BUSID(r2, 0xc0106403, &(0x7f00000000c0)={0x6ab5, 0xfffffffffffffe00, 0x8, 0xfffffffffffffc00}) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000280)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000300)={{0x1, 0x7, 0xff, 0x6, 'syz0\x00', 0xf3}, 0x0, 0x10000000, 0x5, r0, 0x2, 0x0, 'syz1\x00', &(0x7f00000000c0)=['GPL\x00', '/proc/sys/net/ipv4/vs/expire_nodest_conn\x00'], 0x2d, [], [0x10001, 0x28000000000, 0x6, 0x5]}) sendmsg$TIPC_NL_NET_SET(r1, &(0x7f0000000240)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20040}, 0xc, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="b0000000", @ANYRES16=r2, @ANYBLOB="11012dbd7000fcdbdf250f000000680005000c00020008000400000800003400020008000300e40400000800010014000000080004000600000008000400060000000800030000000000080001001a0000001c000200080001001300000008000200000000000800030000a00000080001006962000014000600040002000800010002000000040002002000070008000100018000000c00040006000000000000000800010006000000"], 0xb0}, 0x1, 0x0, 0x0, 0x40000}, 0x1) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000100)='-\x00') ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1000000) 00:40:38 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)) 00:40:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6c) 00:40:38 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x2001, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0xe, 0x0}) 00:40:38 executing program 2: syz_mount_image$nfs4(&(0x7f0000000140)='nfs4\x00', &(0x7f0000000180)='./file0\x00', 0x8, 0x2, &(0x7f0000001240)=[{&(0x7f00000001c0)="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", 0x1000, 0x4}, {&(0x7f00000011c0)="381ec4e721a3a70b1b6e97a73657412f9fcd141d9970ccfeffb2a202d4bf8ac86e4eec0fd1a1efba20d16dac415859f02a75551ce7487d9aa0266a12658a56ba7f259f433e7185d2eadbb0f1f123bc6ef1fcd25f0e1fee121cf3e5d3a29459c0cd0194f22c3270d63be72e1e", 0x6c, 0x80000001}], 0x8000, &(0x7f0000001280)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00') clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(r1, 0x0, 0x0) pipe(0x0) tkill(r0, 0x2031) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) kcmp(r0, r0, 0x5, r1, r1) capget(&(0x7f0000000040)={0x39980732, r0}, &(0x7f0000000080)={0x9, 0x10000, 0x7ff, 0x5, 0x9, 0xcd5}) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r2 = add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) keyctl$setperm(0x5, r2, 0x20000) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r1, 0xc1105511, &(0x7f0000000140)={{0x7, 0x7, 0x800, 0xbd25}, 0x0, 0x1, 0xa3f, r0, 0x1, 0x0, 'syz1\x00', &(0x7f0000000040)=['.\x00'], 0x2, [], [0x7, 0x13, 0x9c5, 0xae62]}) 00:40:38 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)) 00:40:38 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x11bfbe5) 00:40:38 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x74) [ 892.921912][T11085] kcapi: manufacturer command 14 unknown. [ 892.947101][T11092] kcapi: manufacturer command 14 unknown. 00:40:38 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000080), &(0x7f0000000140)=0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000000)=0x3) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:39 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x400003, 0x0) setsockopt$bt_BT_FLUSHABLE(r1, 0x112, 0x8, &(0x7f0000000040)=0x7c23, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:39 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$mixer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/mixer\x00', 0x4280, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r1, 0x2288, &(0x7f0000000100)) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$SG_GET_LOW_DMA(r1, 0x227a, &(0x7f0000000140)) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:39 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f00000003c0)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000180)="0cc44b0421ce6185f022292271762241fc15a34447fb8317") getsockopt$inet_mreq(r1, 0x0, 0x24, &(0x7f0000000140)={@rand_addr, @multicast1}, &(0x7f00000001c0)=0x8) r2 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x4, 0x400) readv(r2, &(0x7f0000000300)=[{&(0x7f00000002c0)=""/18, 0x12}], 0x1) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, &(0x7f0000000200)=ANY=[@ANYBLOB="0200000000f8ff002e85ac2fc327645ef507c6a181baeffc7df2b6fdeec3aff3f4c4eb950e9c462c8ede2e54375cc7c6158436f44f13c08a0a1b7c0f1ff9fdc15b360d1ec4795d4c0e6f268e0aaf0b3b03d86a6153d0e7b76ee3212abb8f5f70cda20d957c8059134269debd76011846d08a2db0e9cc7cff0fa801f6a4d28873b9bec7b35de131063aa5c071bed4ab90"]) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$KVM_HAS_DEVICE_ATTR(r1, 0x4018aee3, &(0x7f0000000080)={0x0, 0x5, 0x3ff, &(0x7f0000000040)=0x80}) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:39 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)) 00:40:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a) 00:40:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1d525eb) 00:40:39 executing program 2: clone(0xc048000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x200080, 0x0) ioctl$BLKPG(r1, 0x1269, &(0x7f0000000080)={0x100, 0x2, 0xaf, &(0x7f0000000140)="42c13e7045cca1789842e39193521137314d60c40c9ee80c7858d6dde03a857254b005ad224362e78efe1afc22ecc50cd0c0b4a3dc760af3860e62a2b821080965082e32153eb589bba3b0eaf9519ab76296e970b9620fa41a8616aecf8557520d60364131d441076818e5a5d6ef793fb2d49acd944ae54a9c35e79d374e4afda48b94ef48880b555474d746bc772768544b836f3865b83f415e55a9f8af504db18d7f2cd9d0fed8cee301adea5885"}) ptrace$setopts(0x4206, r0, 0x1000000000000000, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$KVM_PPC_GET_SMMU_INFO(r1, 0x8250aea6, &(0x7f0000000200)=""/139) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x9556) 00:40:39 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x9, &(0x7f00000000c0)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:39 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) setsockopt$inet_sctp6_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000040)=0x7f, 0x4) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xcf) 00:40:39 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:39 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) write$binfmt_elf64(r0, &(0x7f00000000c0)={{0x7f, 0x45, 0x4c, 0x46, 0x1, 0x1, 0x81, 0x0, 0x200, 0x2, 0x3e, 0x100000001, 0x2e2, 0x40, 0x265, 0x5, 0x1, 0x38, 0x2, 0x7ff, 0xe724, 0x8768}, [{0x7, 0x4, 0x20, 0x6, 0x0, 0x3, 0x5, 0x9}], "f9a30e8d5d7ead834a2c9831022165a1ae1916b21aeaacf194a85c5bdf3e61d8d4544a2869c22eee98e36a4849544dda1c72885ce8c5813eace74fd74abbfa81d7e7e1ca5a777051ccd88d5649e2ee899799ea8c4f5ae3bb6e64bac23e74b38711f6d52e7602c1eaba0aad8c5fd0477426e86a6ca4d233962db0c672035278f7268e8bc683d70a6e7a8faa142d39f228dd5df08b1b315a4314d5bc699384513ee5eda2d1a6ff4e", [[], [], [], [], [], []]}, 0x71f) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2000000) 00:40:39 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) r1 = request_key(&(0x7f0000000240)='logon\x00', &(0x7f0000000280)={'syz', 0x3}, &(0x7f00000002c0)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0xfffffffffffffffa) add_key$user(&(0x7f0000000040)='user\x00', &(0x7f0000000080)={'syz', 0x1}, &(0x7f0000000140)="55c73b94f6479844d077517f4afdc8ffaecf78cd06fce4df5e9b8db02984440df36c2fa957e897b7b8fb9d4380a8ae604aa21faedbbc3ec4d8e5a827bbd6847fe98e5e4d6bdf6c5424307661472ea5d978a1dd02edbb818c64213cf0e32e95b348ae3f86dccdc67996845b216b4203eb8b15e9694a0536a81a49fc572e97c30712d4c3a261e7185d66e28826b92fb090bfa96ab6b47291412cebedd8f891926427b858f48345eb5cde57c18f8ff2660bd1e93e1442a1907379a54518ba4356664fcb213d07d7d4", 0xc7, r1) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:39 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x204) 00:40:39 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_TRANSLATE(r1, 0xc018ae85, &(0x7f0000000040)={0xf000, 0x7000, 0x40, 0x84, 0x8001}) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0xfffffffffffffffc) 00:40:39 executing program 4: r0 = socket$bt_bnep(0x1f, 0x3, 0x4) getsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, &(0x7f00000000c0)=0x7fff, &(0x7f0000000100)=0x2) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r1, 0x4c09, 0x100) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$dmmidi(&(0x7f0000000140)='/dev/dmmidi#\x00', 0x3f, 0x10100) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x8040ae9f, &(0x7f0000000180)) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:39 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:39 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) sched_setaffinity(r0, 0x8, &(0x7f0000000080)=0x100000001) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$VHOST_SET_LOG_FD(r1, 0x4004af07, &(0x7f0000000040)=r1) 00:40:39 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) ioprio_set$pid(0x3, r0, 0xffffffff) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$IOC_PR_PREEMPT_ABORT(r1, 0x401870cc, &(0x7f0000000040)={0x100000000, 0x3, 0x2}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x1c, r0, 0x0, 0x0) 00:40:39 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x223) 00:40:39 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x8000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x22000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x1, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0xc0}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r4 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x1000, 0x440200) ioctl$KVM_CHECK_EXTENSION(r4, 0xae03, 0x1) 00:40:39 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2040000) 00:40:39 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:39 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000004, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000040)={0x0, 0x1}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000140)={0x0, 0xa, 0x9, 0x3ff, r3}, 0x10) 00:40:40 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:40 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140)='TIPC\x00') sendmsg$TIPC_CMD_GET_NODES(r1, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xe0020}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, r2, 0x400, 0x70bd26, 0x25dfdbfe, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4}, 0xc880) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x14, r0, 0x1, 0xfffffffffffffffc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) syz_open_procfs$namespace(r0, &(0x7f0000000040)='ns/cgroup\x00') ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:40 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x1, 0x8, 0x7fffffff, 0xfff}) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vsock\x00', 0x240, 0x0) lstat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_SIOCGPGRP(r1, 0x8904, &(0x7f0000000240)=0x0) r5 = geteuid() fcntl$getownex(r0, 0x10, &(0x7f0000000300)={0x0, 0x0}) ioctl$VT_RELDISP(r2, 0x5605) r7 = getpid() r8 = geteuid() getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@loopback, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}}}, &(0x7f0000000440)=0xe8) r10 = getuid() ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000480)=0x0) r12 = getuid() sendmsg$netlink(r2, &(0x7f0000004340)={&(0x7f0000000140)=@kern={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000004280)=[{&(0x7f0000000280)={0x48, 0x37, 0x0, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x8, 0x73, @uid=r3}, @typed={0x8, 0x4b, @u32=0x8000}, @typed={0x8, 0x37, @fd=r1}, @typed={0x8, 0x61, @pid=r4}, @typed={0x10, 0x3, @str='/dev/capi20\x00'}, @typed={0x8, 0x6a, @uid=r5}]}, 0x48}, {&(0x7f00000004c0)={0x25b4, 0x12, 0xa01, 0x70bd29, 0x25dfdbfc, "", [@typed={0x8, 0x57, @pid=r6}, @typed={0x8, 0x1e, @u32=0x8}, @nested={0xb4, 0xc, [@generic="88139b6cb19c0fb8524f31cc6b518e0f85669cea2e01188f182382ff5c988df1ffc7e02b2a9e4a6f033da1cf0e2f55f5a3c3fff5486c678768ac212e1347e4e5e66d668f1225586a63d169a3f8c55d13cd833620987a03bdf3e77d8b8c346c91aa8688afb5a7f4835d9b2d3e74cfbd05a7b76067ec1a388750bad6c525a8957c3093e6207a68a56969839ea785a8c38e35c9c114572219b936a8e69ccaddb8f82a4d3ee32c1b95f1c864fca965f5e7"]}, @generic="5db760cf7033570e26bbae3dbeb7f1242ad80573991004a37d6a2e74c732707d0992c087fc635548778aad17201f690b91001e34d302e607c27df415e5738779a2e979f59cd31f03d86576e18b3bdfa9a7c5162a57617d9fff901c3ca0d3495c42cb25ad00c6c3d8bd0ccfc8d76db02effa78c568ca7cfcdf6055c3e2b2981bfd6d749f89b52442328779306e0", @generic="34304f4641a7a544cb79e21dcbedc8b5820df7d1d4990ed2bf0eaebd1d2b7eb690d398787a108cd9596927e98bd615f672c5204f55e7fcc3e72ea5d08f16bc52ab7ef457105b4c96089c6b5fa8b20b75eb11f70de49508b203f2b3cb9db96f0b7f4e8d7c7c16ab72da374eed2384be9b8e32509e825bef90d60a7cb092f0c050a9307cc136c09d78619abbfdbd8c2b0e4c1a86484d91e828511bbf4219e6e0579a39839c61b4bfd6e2faff916cb1f3b9b25a572a0f952de96e693d879ef2dc9ec0cff174b949cd926769b143ef4cdc1dcff549974194d646f994af46482436c133b439c1b0dcb7b3a9d4d2", @nested={0x2174, 0x93, [@generic="4764fa7d639c3426b227a8562c24fa89011c755610022a7484d2fc58b3f46586e9fc619b6b2ecc5400642234a9068927e83f9f2a603ccda2921ba0bed4b10893330ed9b501b4db8a9df5219d646abe58259d93f55efbc533dabb48f4ea5cde79086dc51ce450458e1f7205fd37507848677255fbb811df6b3ca62c17c8903970fd29fe666bba7f", @typed={0x8, 0x4f, @pid=r7}, @generic="20b8954bb448877a743e8743507aee20112ec6822cb2b71486d0d6c382d14fb0a26bf15c9d56985ca672add8b78997ff319cdf75ed1bd7fa2993d45f2475e7803956209f61a71158f34d15a66ffbe17006f5d468e3a8463754b127087679b8a13f53f33c352505252f3e56ebf21c899fc5978b985367188f09e2ee924910bc9f5511214cc8f7198dda81eb379c3d091e2b9713830a56e225e88d7ed80b0115b0432f48e2aacd4d", @typed={0x8, 0x24, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @typed={0x8, 0x7b, @uid=r8}, @typed={0x8, 0x80, @uid=r9}, @typed={0x8, 0xd, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="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", @generic="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", @generic="4c398b6beca2773af956050a74665270c083e416b227ca"]}, @nested={0x28, 0x13, [@generic="bb1132dc87ab087203a5bb9f056a2b8bab5bc01b8c76552dd16cbb", @typed={0x8, 0x91, @u32=0x8001}]}, @nested={0x1bc, 0x2a, [@generic="2c665c904388b0807dc2dfe2d5db7834ebba60ca61745d7c753e7b99d9d3bea1c44415495cf6f45d4d1916193155fc26bfc7f5650838d753e9ce077d365d7e1874260fe386b99bb5b5", @typed={0x8, 0x65, @uid=r10}, @typed={0x8, 0x93, @pid=r11}, @generic="ce8ecba2b4dff9eb2f4400bd59e213e3482ab653f11d4a869e85d9f379536c6644037f71aeb5ba6d0357643de97fa4d041e6f08a63624203387c7c4a6c7f952e78ca417c8b7db1191860832fe8956c50729d6f403fd05f5f4a20d8be144c6c1a756f3c", @typed={0x8, 0x42, @fd=r1}, @generic="b6e97fa42652950994a4904b7af233a5fe92e8edd7af4300227c4e37f8f2bc225fc9db5ed6cae0225d04e7f6693c366ad00ff999f81f5b16c8306fcdada2875fb0c30d384dbff54b3033f5572fba29a259ce2ce7136538df7056b0d88c28322c565118eb585f2202d658e523b27776b729eb8bbcf050b166864983b105977b5a71b57d86a18bb90150bc3d36150c593e15c2be713cbcf1a69409cc77a2718f6ad314b1070524624c41bdda12edfcf79f871c2bcabb57229d3d71a2cfcb3cd7af13aa91c25c3d9acfb0110150e765", @generic="8f53273657ac4e52216125102cbc84c80158f32c7fb797067cc772faf9797059ab7ad4"]}, @nested={0x10, 0x4d, [@typed={0xc, 0x3b, @u64=0xe59}]}]}, 0x25b4}, {&(0x7f0000002a80)={0x488, 0x29, 0x722, 0x70bd29, 0x25dfdbfb, "", [@generic="9106e9b9272097a4d024c7f56d1f8b88bfd464e65bcc7f3cf27a95509a5e81028b7b452fd0235ab97f2044837f3db3ec878ed2ab33b40098eea3d7f3f93afc99ec8dc0e48f481c00790131e349286586e10fb0462b1648e716e836768e38d710e8cbfa0259d708cd32b04ff4ae20e6a9f76eb52a9a09160f3efcb63610c458494b7b0f14ad2c0f5075f2d752598eafd2c7888418ff3671378153fbffcca8e71334329fcca9468dec", @generic="7af846a2fd39908a1294a30dd3266be7dc063920540edcc19b10fe6bf2b0b4371a04fce474eecfa75d6a3daa26cdac70e7093cc8231180699a2e83cc10e3ca5a9db4fdfaf7b8f87d91984cca3b4ed5f1bbd08af04f90ecdc958bf50eb6329c6770bca0fe4a15ab7c58f64da0aaa5b5410e0d1559d4c68e8a4d6600f2d1d2fc0e39e0e6d87435307ad717bdfb09fd8043c0d2b736a6a9aaee9b86928bca781101dbdaf0a338d0575ecfde29413c5b8fca625316d6070e41c07454", @nested={0x250, 0x91, [@generic="3a8b24c82f41ea6d061221a5a487ac0fdb24c406428562753240d20f1c3477cfbf03a4fba0691d6002db7821d60b94464d22f9399685d7fcf182a3b83d03bef36c7347618b1b8249de9b97c34770e8148ca4639fc39ca9313673aca4b719271c4cad63dec7dbb9c3154df2a8bdd4c8214c9de352ef2c99e7c09c5d82e95a242d6a67a4f8ee56ba24bd311c7bffd90e26b43c", @generic="8c7849f2e6dc6d824385e9c801458710605b3c4fc7c671dbdc2166ad6f9548546660df17355a40edb18109fc7acc84b713a0baf3f334c1c75809a179fc874915d45ab7e258cd9ec98cdcd110a1c7a36a6d65c8e7c8f5e2c4d899353fb91185ef75ce116023853782de9f96db72281c40d3a1558171b1b3c8eee8f30d7fbaf5eb89fa698e4a96a1e35873349eaed0f7bb421d51190934cc4919cd645d7fe73444bc6a966133bfc1493b917656fd69244fde6cede527f932f01413a7bf6676a13893e8b4fa2d8f45e32d19e08242cefda9daabe72deda9bc680f6272985cc1110bd62b2eb5eca04c376ca6", @generic="b6e28860641a3abc9c2a2ad06d596009334d3e7c42ae2777ac15c2a1d647b73e4f5522f7609fb4d9c2e3a7a39893c6899c56857c520cf186e2cb6ebf51103655cdff86fe8c2d8c881d637db5d5938a6515fb08832484844d90e8bfc14fc299f78e2095e00fa98dd3149e29b9db6cbdec375299792398644f38b182c222aee0bb1207d28f2073c7a131924ddbb3652466bf8e1c33a5735290ab919aa0631e238856d2b3e792f8e9d10b685819fe1ddf8c4a568a460d95621ae50ebced519ebbbc4fc65d85f8c6262b9613d820439fb716"]}, @nested={0xc4, 0x6e, [@generic="4d32e32ea5e22201efc71bd334cc903df505464911830b50dd28fffcc6f1dfdf22763c58617b28362e0a2e0e7657cbb2f3b2a20a4c67605d559ddd74d92de8c4d9cca86abe68c1c62149be3bf385abb563eb1ade12f1cc289712617d7afdcebfe4412a6864313f3f675ae42e9f9f36e09eae1aa7bc2c1fe54dcae90a06bda1e33ffa2e5e0451c2a8e2b5a1c98fc2cde803ff5a7679ad0e2a028f6a4096e1aea3a36e037347b3", @typed={0x14, 0x100000001, @ipv6=@local}, @typed={0x4, 0x7b}]}]}, 0x488}, {&(0x7f0000002f40)={0x1148, 0x20, 0x806, 0x70bd25, 0x25dfdbfb, "", [@typed={0xc, 0x94, @u64=0x42a9}, @nested={0x112c, 0x64, [@generic="0967bb00b25955004bb4ccedd91a2edd8c8f395dbdb68d40c4dba3d53e0553a05d69e75dcc46dfbe443d", @generic="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", @generic="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"]}]}, 0x1148}, {&(0x7f00000040c0)={0x184, 0x42, 0x800, 0x70bd2b, 0x25dfdbfc, "", [@nested={0x4, 0x1c, [@generic]}, @typed={0x8, 0x96, @uid=r12}, @nested={0x168, 0x8a, [@typed={0x14, 0x5, @str='user)mime_type\x00'}, @typed={0x8, 0x0, @ipv4=@loopback}, @generic="dff97651927ca72fcd4d03fb232f741717beaefac3f40578fd2a35177c8fa86e8155a000baf61aecbf78fbb62a06f590f55982ee9878c804da586136df217fb9b3bcda7e6ca421828808f68594d5d8747b3a6f9cd193a989d6bcb608076fb12a9d492696ea953459ec9dc5ce2ab25d92097d0c7f3fef308191f62df4cd94c5423cacd578e8245308474ee685b10b45092a5dac9c3c067b47c9ed932b01dcafefe570f1585b20d3fe95b5b04af6d9b084fe45127123532cd1b1d0736b03add989f621", @generic="9a3cd40e21d4d3152772ed269df1d0f30945351269010b7d5b59953c2bcea9cbee8675f6c4d7e566ca79b27ec8d54975691768dc3af8a1b84638fad2b6ef938ab4d742e1c76e57a97550b4422a7ed7ff4deea6beee3595bf786f07e7f65504a40085bc0b8fc41d9cec593d36947f0ab6d891629058", @typed={0x10, 0x1f, @str='/dev/capi20\x00'}]}]}, 0x184}], 0x5, &(0x7f0000004300)=[@rights={0x18, 0x1, 0x1, [r1]}, @rights={0x18, 0x1, 0x1, [r1]}], 0x30, 0x44800}, 0x80) 00:40:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x300) 00:40:40 executing program 3: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) ioctl$KVM_DEASSIGN_DEV_IRQ(r0, 0x4040ae75, &(0x7f0000000040)={0x6, 0x5c, 0x6, 0x505}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='\xc1proc/Sys/net/ipv4/vs/expirn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) munlockall() tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r1, 0x0, 0x0) 00:40:40 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3000000) [ 894.151436][T11626] Unknown ioctl 22021 00:40:40 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:40 executing program 3: clone(0x2000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) [ 894.189802][T11631] Unknown ioctl 22021 00:40:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x402) 00:40:40 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r2 = syz_open_dev$mouse(&(0x7f00000000c0)='/dev/input/mouse#\x00', 0x2, 0x800) ioctl$KVM_ASSIGN_DEV_IRQ(r2, 0x4040ae70, &(0x7f0000000100)={0x5, 0x5, 0x9, 0x401}) 00:40:40 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/pr@\xf8\x84\xc3N\xfc\b\xf1x\x17\xbd\xfa\xe4oc/sys|J\xb6\x0f/i\xf0v4/vs/sync_persiot_mode\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:40 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:40 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_NUMBER(r1, 0x84, 0x1c, &(0x7f0000000040), &(0x7f0000000080)=0x4) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:40 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3f6b181) 00:40:40 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dlm-control\x00', 0x600082, 0x0) setsockopt$inet_sctp_SCTP_HMAC_IDENT(r1, 0x84, 0x16, &(0x7f00000000c0)=ANY=[@ANYBLOB="020000007cc96a28"], 0x8) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 00:40:40 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x500) 00:40:40 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) request_key(&(0x7f0000000380)='encrypted\x00', &(0x7f00000003c0)={'syz', 0x2}, &(0x7f0000000400)='\'cpusetuser%\x00', 0xfffffffffffffff8) add_key(0x0, 0x0, 0x0, 0xfffffffffffffd69, 0xfffffffffffffffb) tkill(r0, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r1, &(0x7f0000000340)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x240001}, 0xc, &(0x7f0000000300)={&(0x7f0000000140)={0x1b8, r2, 0x100, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_MON={0x2c, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x4}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1f}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x3}]}, @TIPC_NLA_NODE={0x10, 0x6, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x57e}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x100}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x800}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}]}, @TIPC_NLA_LINK={0xd8, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x101}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf8bb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x3800000000000000}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x869}]}, @TIPC_NLA_BEARER={0x14, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x306}, @TIPC_NLA_BEARER_DOMAIN={0x8}]}]}, 0x1b8}, 0x1, 0x0, 0x0, 0x4010}, 0x44) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r3 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ptrace$cont(0x18, r0, 0x4, 0xffffffffffffffff) 00:40:40 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = dup2(r0, r1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000100)) ioctl$SIOCGIFHWADDR(r2, 0x8927, &(0x7f00000000c0)) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:40 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setopts(0x4206, r0, 0x1, 0x100000) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/nat_icmp_send\x00', 0x2, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:40 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$DRM_IOCTL_SET_UNIQUE(r1, 0x40106410, &(0x7f0000000040)={0x8c, &(0x7f0000000140)="5e9a1fc9198686e85630ee1fa111df1ed6be48618fc0f1a2c6952008906fffc2b1ec3128aced624aa27f4c9973c711f00b8a2a5262187a431c4fb9e4d255feabcf1ecd2c85760f857c135d190a53d584ba6cc8f8ed3315c689774202f5ddd6c8d4ee537b5e5ebe01b0c4ad54a28c69fbc6e2136665c981034219b6718623aac5b873a803b1fec0ff094ac7fe"}) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:40 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:40 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4000000) 00:40:40 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x600) 00:40:40 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socketpair(0x80000001, 0x5, 0x20007ff, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$ax25_int(r1, 0x101, 0xf, &(0x7f0000000140)=0x9, 0x4) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") rt_sigsuspend(&(0x7f0000000100)={0x7fffffff}, 0x8) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:40 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000140)={[], 0x7, 0x81, 0x4, 0x1, 0x9, r0}) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r1, 0xc0a85320, &(0x7f00000001c0)={{0x100, 0x6}, 'port0\x00', 0x1, 0x840, 0x0, 0x8a, 0x6, 0x1f, 0x2, 0x0, 0x2, 0x8}) tkill(r0, 0x4) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000040)=0x6, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$inet_mreqn(r1, 0x0, 0x0, &(0x7f00000019c0)={@remote, @multicast2, 0x0}, &(0x7f0000001a00)=0xc) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000001a40)={'vcan0\x00', r2}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) r3 = getuid() getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000001880)=0xc) sendmsg$unix(r1, &(0x7f0000001980)={&(0x7f0000000280)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000001800)=[{&(0x7f0000000300)="c2f098b897a54792ba63a2697d2abbab530e06f9c7f3b49c401b406a5ef7cf46c3ba6ab77392a38250f56fb9f0aaebed0d72de88363580dab3546431f7b82a814c22231706f7bff1af43a871a05c2e0469b68dbbc068258049712c60ab7eefe9c5c4715828f51429f5c861559809708d9a2aa4293f32a4ba08bb04935e69459c0a353daf7c71b961894fa16c7c1986b251", 0x91}, {&(0x7f00000003c0)="08dfe67dcaa149b76ce2979058f1320c66dca983d164d0ef988e7218887e01ebd728fe660b7a051f708a9ca6e3854ee5fab4824611384fe0183fd4f3bbe129f26d601176c8b78eafae002fd6ccea2558f746a22cc3baa37d3c1b66440158878bb509cfa7c670086a7ec2f061dd1a302232f0ad68b0668741f9b3a791dd2af09513edca60a58dd65b29e7389164451e015b61e33546f2774560453d1a7e90911fddbee66887abab8df1250331432fe14fb3e495b008059e15183246d34f62dcdda8dde32c41ab7b0d24864375fa29092eb954b6293880ad47bfade6e468612c2b44ed51dfe5b7497af81ddc36d859e5b031c422ab50aafb47068faaae659d20e44e693a7b50cff12a699f2f08cd1425f8333d2f7debe499f259f5263df2f66690bd5fa40168c5199fc4b445605d30d907ea066d3ba71d0ea3a50040d7fe36ed8927c959671d2f3eb2c90e4cd2d345908c8f2fa861b12523425f99a379891ea347ef58f6d5f8ae044fa8f1fd155851234e0b278168944dd10316c8e4a8aee9302235c861ce998b8735b2761902cc44ebc936a0de68d927090ac236fba5926fd91cb49c80d634615cc1d39cfa4123894e7cc2e79c7045365ea29c66fdf96537f1872559385de1d4e2d72303c309c4e71b7383f0709e8fe315f837df3196830123d0226ef0f74478ea0c3e8ff4aa9fd3189fbde770a1d555703924e40be9a8b6e21ce5b19fd6ffb4dcf3003110f6d089b426db0e5be9bef941928697a499bf5bcfe56058bd79ef1844457148deec02634f8e86d1889acac91bb1a83442e08a015a19398fc075f7abb16c0ceb9c4b0c3ce56afae12ae2b6bf9bbbcb4fc09d1ebae3986b75ac7302fadc9025f72afb6bbc2b092498dcc83ac99e9ddd1b0a8694593cfa76098e8ce2996c428db26ec82efdce2bd6b80e7207e96ba074876ad5e3f537592a4717a61f68d7b70bf20cc890b7c7d16357c94491d7de98dd3ae1fc9aaa140486918f63e04da1dd658dc8da13955a2378d3c2e9c46815db8acb95a133b47d2e614d50162b653f3ee0707096dca2027e3105a336e9bbbe4b517ba9723a30f2f65ea350f74d80e3625f27154e188a0695017a61a8dc9dc9f52646055f59ad665d04bf3a9c943a066618c90c9ec2c88989391682f5f99c5f04f2572d474e2e8e937cd7b16d51144313cf846a1a3a70b28bde5c3a1020f3f3b8fcb69902e82d2034d3345d7bb2a8e9045afa588eb243b217d69bf398579cec36854b351cf1d14de868c99a448e53696251237b67b66d612700e34535aaf13d1242cd896dfe1b86f6f430202ba1469b35aec1593e1a7482c688d2a8c8cc43ab3651ae6b96e633ffb6295a2dc2f29626878adb50394ebdf8202b07fa23b0b250b7a54a3677c444b790ecdaa25b744c9ec852a3cd61e61e7eb3cf3fb6293d34700275dc160205b6bfb71bb2dcd897457d92e84cbdcdfb88adb4ddfb13952eac2380c95c207a860a122bef39d8427cbe74edf8ea4fc9477420ea4d755dc97faa323e454a60909fe599abf82a0dc76ee4a89e93e602cd1a66ce4c7aec7987c3c24d68f8da6e13d11c8c973c7d3339c5fce6f3e90cac6a8b9d54fc422e1d1c74f43a709cfe9317e98229136f9314e2b09ce15d7f643837804160d3baf163650eaa0511969304066910879bb6c0593ce15b5e49fddf1896a9e48580d81f13d6ea3d0266846f5e77f8fd0dee3c3446abc2a9d3d02e7ba9d753123d244f0623678c903303a29461e4938ab76f2aba93ddbd1df4de6a14126474936f8e48fa4ca945dfec134fbc79b1571e77a8fae6e6d59214eb7cf482a4a7bacc87230fe4f66daf76de5bccca485778108c33466c5ef4e2cf89880d9237330fe12e8affb1229daa9299ffb88d8b827ec4a381379e8b882fbfe912afb6e03d33a264cbb19c60f7822d2ff9193d583cfe0c5d2df0cae4c608a625ad8f0d29869dd7b18e129d250fd78ef10c3aef6c0617f2fb58bb7dcbb2567b5a5339a99d56df730b622af2890d7f10a1d3b5adab86660fd4dcaa6c5fb57952bed49601ae3e761b9b65f8f0d1792fd4135aff96e201c3c91859b5369ac67fd4425c61ddfd10bbab15e38930cd9e47afdf591b63989ba8a0faa6edea4bb2baf5f384271dfb1752f5b1b7536fef3dcefa2f37acf3811180fb8964bf6926eef0e0149bd4a8fb9326dae5007ba3aeb2193d4b3c2a60188bdbba83b17e3ca7e903d6fd68361c0396147131b83b408f0fa733862fd24309fb78c7711a64a10d97ea485aeba386ef72a1fc7872c1eec8c9bda0c15eeec5b9e6f3f25a807d8e74f83c00bf1846d60a54c5abc13a28046012722b26ef09b087af91af03a0c7ebe0a1cd4c7ceaf689b8b47a38dc49cd18464b5d88b9a09d9a3a3d3c781f048c38b9f8f128ae35bab77ac5ed355b4fc924f32278c7bab6af04157f5a03b2d8e22b2a967616c7fd67ac016e9e17c65b88d3520fbbb944de5bf4f4e692e4bf84779d137e3a280d5fbd549a18dc0873b597514f595cc0068a182b246528d9916878acacd0992c432d17c58a2af5067c6283d23f112bf246990b3220f39133c82235c14e715bed0d79b8d4376b9d18ded3b7a1a3337a36daa0fd97019721cce05b72ce1d4d2d9c12f043e5a87e8ee755ba15b14b5276d75baaa71c38479119a57259a7c45adea91cb6e0936d74b27a16696574fb236f1b5b8be28e2e836552df08a787f843e1fcb4338141e49791bf3a0252ea888a33664c3478820c37791dba14e759a1760a469b68567ed86ddfa144d0a0ed2f3b252122c77213f478d24a624b1aadeafcc89e744ac3d88bb3560b91c575073b0125672202ecd3b218619a7081d85385a88a150d7e88f94bd4599e47e97601ab928edcfcc20c69da0128b1e51e22f607c8ac1a959d8bc6699b80c43e89584926dca5ac8643c4fac64ef40e5f31981d99bfe56e4fa7760843db9fa6175152026096203b4629dd5070e00c98bfccbd02545e286dbb01bef9af538cd38433cb620ceb475dd3bee4c4f62879184b14233ba03c338b723053a2b05e21761a2016075add982ae64716f91f482e362b94a50c5dfffa6c8491a8e62543f4960b1a483697a076682b87778a3c5c5e02da9fa45f8172d38e51efbb68f5ae34f1907b03b0235f16cca48a2e1064cb603921c15e15e66b3ce53a689e7d67b92494848b4f7ac05d27ee8d7efa4a881c6359ac59b055a8084ea152198ca5882d513de33e9a1f9ee23144b6aa19c236874d78a3d4212ff99dba3c11b77a862ec7368400ae4216187f8f66d044a2a145c49f339c20b583e09cf26daaedf0c5686566ba6ae704eb2c5479294dab9c6befd6bf5e2b8eef66809bbf2e9a047d77694de87f4e561d0c5cb11e2ff7d32ce25ed82d1e3bfcdf7733a5188b8aeb836eefec2ef57acee7634ccc2e79257e6273964192ea994fe26579b6caa5a49f1b4e65bd610d09e336483fd736d40d8129a97d4710d4f17de86684c53c88596f6c1f08ca43b4bcef51f0b2f74a2f39f90cf4af86c8d964e922c70b01083382851e9b84174576a386355a39558698711cf7cd00cd0c039c2b1348bda259dc220ebfdee219dc9d5cfe4338e0dc6e9ad6ca9b98dc014b0b52cb973c96a929cdac0d29f12f1628914944c1506b1fbfdd0483ca6eff011298cf1a5c2d12e11d03b1941c2d549bcf31f81228f0850504156f96c1a3dec9ffd63c433a8a93b76a86a8d5a4e73f49750748a2909bf80e77bbf0a66d587892fece9e704d24d408cbb4cc8399967ddf9c6ba794460554d8529fcf4ee549bce4fb8e2713ec8022313a7e219c86a64f36e8a93cec5142fb9af111cf81ef8c2e715620d9c7e68ba76845f1d5cc7bd8fd0a1b9407bde0f552cc220f473d34634782e28fc9e02bf12ce583bd5f8c9cbc53d1fde2fa7af17da4a32bef7a997e3de4b24d710b4892935a33c20b2919021c10f463171de562abe8340a85639999fb3a401bb73d005ec4abb46ac0899232904710f2dc86557bba9bad75cd57db1d8dbc90504952a859a7bca804f945a3013228239696241f951c8a39d0ab82abdfa44ab7f57c8aa868d1f9d3a7562efb3b49d12f07e214d663d96dc5fb2031c197db6e8cc218db69d28938b34b88736b2d9c1faf16ff7ce08666a4646f9cf86f24de5a1c12398c5d1826a24745fc8cc0134eaf229f66752bfe18d49b5b8729be07757c0f9513382b52d2debac88c164cf959d917f1a476f7d3433cc6973cc502aed9b02a295790e734139b6a58acfacaac235076785d5db04377bd5b5fa83bc20032fde5bb9631dddf6a336f49cf8e96e8e4fa45c057554191d26b9007cf8c52c3806420c85595064be77024bd63f4cfb8a2c67ef5d8a68ef110bcf6e4a3b99686e1170fea57c5a91c87bca4e0f7537677a1a50206f3d0880392fc434076163c7101ff342633c2376853bfe416f2b94189c1bd2755517acee149ad676e7e20ca94184b1c3a5aaeac12fa829692a82d5ab3c7f1971d0b5c9cb93ea9f890500c3dd92d9e3148e51ad80e9847c2672130149c797a2a4d0b4cb54e9d2ca65cb4934e63f117aef9dba9b0b692d03e21045dcea647bff216ddb5c8c74be15576b83383a472ebd7e58f15c41ca84c077a64bf5e982cb94d95d0ecd7ed89ecee0927fae01468084b049f704a3166a9f8da8145c1694f69e58ff7828320da04258018517e22175651659a1e3bcc383ab082dd9b072bc08b7fb5d01275fc9db3923404a128330024a90dbeb9d1801df540b344305552dab314f2e5d1b626c12ae8935b91d2b35b54f374113c631b5dc5bf4e6a8f195981f6624c441825e35187c969798c523dc402d9de9352d8928dfe1827f710525bdb293ef8c1b02a67aea7f764ea834be86f5742e070b4b64475e6adf1d6f40d6f025034c86c05aff598d2176deacc0fb9e73170a6d8b3b4864771d3fc8bb0cf9834211f910eb20d8a2357cb5f53c6f5a914d3810af1468852ffff2cdde9236020c42101d662709c2ac00cbba472d3e43df249cb86222e04fd8fd031eb96e80d2ec38ba7b17acb6f6306010580043f4d37e55ffef9c823d556fe95ccb196654ad8fb2e47f5dc92f27e08ffd2ec47df4ae1dbebb4d646b8478997070b3e2fce4d4c83779c066b6ffc493e7955e9ee07308850bf6eab24c2b021593074b722f179b6aea1154bc953cd3586eecd8edabc5399bda2bfb8e14a630c5376452d5e4845f50342f7b2852243e94f83e3bce18e973472eb1495be6acdb1235288efb760fbec8d725e36b0f8b74841b826240712650f6f3777678ba46e02b47de80a272b56d1770f86c121a694fe34aedf511d5544e7e4515b793fbac5070cbaea738dad79bc9babf18d678e00c6fbf7907de927fd8dbef669e7f13b7e35718274ddd587705eb81c97d6d3d77ca129352de67ee54bff467185835b2b810133452309ddd2e594f6d875dcaf91ea2037530b85e41a09bcc3d314d70ba0ae9aca107936aca677779a288185c21da5d075861133380fe2b655ce7c3c77b5a063f33653d62eb07080f1354f652ea8e28b267eb18c08a014900cff06af69052006703671aa2ae2e814253c5890cb574601bfe5aa49cf877c4519ac4fb66b57a261df8f3627ec36e071e886def96775908edb0be6e3808914574181e670721314140e000690b3206be705d183bb80b087bf8a7ee762967a691bd351ee1a13fa3921fc4cd6d76270b02011224a1c2a692274ae041ed4f7d896e814dd8c61411ed376aca9e96671f79600def3bfd5eda031170889ef5ea9e541588f28c2708a885e", 0x1000}, {&(0x7f00000013c0)="32b8964d7d80206503933668b5a558fea476d0d27cfa6778e3672337e3ea1f6431f5a9453aceddc5aa7747a7ca6fa686b5eb0a91e36ac066afa3b4c71b35a1a671a71b463ea642fc80f607e618a764f8b657167be756e0f02f188903fee121f33048f153780fbf54f5e2415c8429054223b88974c3c3ffda139e4812e0de09cb24da171cd4ffbdb5b3ba2568a1e1db3478242f1dbf3031563102bb1896eabf4fc308d5fa3fc3f856ccb0c340499a03db8fe14d07ba288ac58a6506e3bddb36cfac45abdb6f6c5dcb03733c57e388a4df09b865faa5230c25b80887f71b45c636f4d535f3c4245a72143d59f866152ed3cdf078d7060537565a4a7a5ba3", 0xfd}, {&(0x7f00000014c0)="94168a00b6b96716e9e4161f869273f24f4f0edb3561d27cdf434efb6fc25f42723224498e17a659054bf623fddfe1afe11b1ca7d3f9c547ad9bb3c6dd3cf11b638a737aef9b86583d827b3169456bce8def8c67468418c780db2289e74bed8802942afb0fde2e55ccdea9732335352c791463fb0f3ce3d42b0183eff64f3a7f78d05e01eb5eec8060d6bbeee355641afe5deafad329cd39f22a70c6cb94182e0aa7d49f9eb16681bc5fab9ea3bd6870dccca9e98a4cc2ff0535b5e446b9d17485b9c4351be065e25555bc4de57dc1e0197bcd27218819ac816fcbdeb8c218db07f6ee456b8da9ea1e1f7e1785f651ad", 0xf0}, {&(0x7f00000015c0)="494b05a541e286516d0d741635648111e4be0cd7bb11dafb011b2e647b522b91f31b8a0a5530fdde4f4083df49c9b2bfbefb46841d9909ad706f1ec67d176a0aba31a3f533ba4669c999aa89cb165313b3a8b1ec841d9b3ce4dee5c6e179", 0x5e}, {&(0x7f0000001640)="d37fc449c8c70bdaf57c429e87243d0ae867e91b5bb644d72e3f4a91fed266a6f6775611bdef158d5d439a6722235a9dcaed018d4b73a94d5e9dd5ef6b8361426bacc59c24149dd72485fcd5c21aa428a015264e30f910886e308cce862022bcf67ea195994563a980c4b099b9ce1f21f94aa0b8e247913a0e4cfbf52c0f2e88f91bbb79809e689c2bef48e5bb3198a226de3ecc67a7d76cbf93f691003614ae769de4dbedda371401444615b6ef6f9e0c445c71", 0xb4}, {&(0x7f0000001700)="9a081050a517b189cc0d48d2622018beb8dc51fe10c1fe06005f78550ec96c54c1d8e563e8022fac64e2076b3d262000c8b63655ba534d5dcede8c150970143ecfdfc87e57bb8f2a1ab9df0747ce97f7dfca72d65af8030e256d3a95ad2ddee6916c686e92ed95ff726cbae4c95fa9b2b4998e82bcc3231bf5be9cd15b5cb313136d3ff37b823fca2d968f34af29fe39868a50b83979defe51def204021ea046061c8f538ac54e81eaadb8dda7295282f7d35bb88f62b11c329b24d46e7343b987dfb5f129ae", 0xc6}], 0x7, &(0x7f0000001a80)=ANY=[@ANYBLOB="20000000000000000100000002000000", @ANYRES32=r0, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="0000000028000000000000000100000001002e27154bb23844ad54fbb9f0d77ed20c1a22d2600b9a27cedd4d98b4d08ba2c57dacbef70a09cf95f373df8313514a65e3176b50323247e993d1d0a23bccca2a7a3b825e2edaae0259695196d4385e6d2ab1371eecb700000000000000005e89d016ca791c144d08ba931c5f6a6a3f62b396255f3836f826ce7cc6ab81c030ec13b1d0ee65cc61e7cecc81f34249290660dcd28da649215b91cc310171b7e69f41f9a082046ef10180d3448c8826a939e1995950cfb1e58d63e0c068ecabc61f7991937e83ee4824314b07c7468d7f54010ba17a82c1a1f29febb4d667df6494b93acb061d9a5f9e50a3ec30f5bf9e565c8a5c949a159462998031f9f3bb32e0", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="28000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYBLOB="0000000038000000000000000100000001000000", @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1, @ANYRES32=r1], 0xa8, 0x1}, 0x48000) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r5 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:40 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r1, 0xc008240a, &(0x7f0000000140)=ANY=[@ANYBLOB="010400000000000000000000"]) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$peekuser(0x3, r0, 0xffffffffffffffff) ioctl$VIDIOC_QUERYSTD(r1, 0x8008563f, &(0x7f0000000040)=0x0) ioctl$VIDIOC_S_STD(r1, 0x40085618, &(0x7f0000000080)=r2) ioctl$sock_FIOGETOWN(r1, 0x8903, &(0x7f0000000180)=0x0) ptrace$cont(0x20, r3, 0x0, 0x0) 00:40:40 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x497c6ac) 00:40:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x1, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x700) 00:40:41 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:41 executing program 3: clone(0x7fffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={r0, r1, 0x0, 0x29, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00'}, 0x30) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x0, 0x0, 0x0, 0xff, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:41 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x40, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4d3909f) 00:40:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x900) 00:40:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000040), 0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:41 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fstat(0xffffffffffffff9c, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fstat(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_virtio(&(0x7f0000000080)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='9p\x00', 0x2000, &(0x7f00000002c0)={'trans=virtio,', {[{@version_9p2000='version=9p2000'}, {@msize={'msize', 0x3d, 0x3ff}}, {@afid={'afid', 0x3d, 0xffff}}, {@loose='loose'}, {@cache_mmap='cache=mmap'}, {@cachetag={'cachetag'}}, {@dfltgid={'dfltgid', 0x3d, r0}}], [{@euid_lt={'euid<', r1}}]}}) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x2) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) ioctl$TIOCNOTTY(r3, 0x5422) ioctl$IMGETVERSION(r3, 0x80044942, &(0x7f0000000040)) tkill(r2, 0x4) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) ioctl$TUNSETVNETBE(r3, 0x400454de, &(0x7f0000000380)=0x1) 00:40:41 executing program 5: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa00) 00:40:41 executing program 4: r0 = perf_event_open$cgroup(&(0x7f0000000140)={0x0, 0x70, 0x7ff, 0x3, 0x4, 0x8, 0x0, 0x8, 0x1, 0x4, 0x800000, 0x4, 0x0, 0x5, 0x7, 0x101, 0x3b, 0x5, 0x0, 0x4a3c0008, 0x8, 0x100000001, 0x7, 0x8000, 0x7ff, 0x6, 0x3f, 0x1, 0x9, 0x1, 0x9, 0x100000000, 0x5, 0x6, 0x0, 0x400, 0x82e, 0x8, 0x0, 0x7, 0x0, @perf_bp={&(0x7f00000000c0), 0x1}, 0x24482, 0x8, 0x0, 0x9, 0x10001, 0x36, 0x623b}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x1) fsetxattr$trusted_overlay_nlink(r0, &(0x7f00000001c0)='trusted.overlay.nlink\x00', &(0x7f0000000200)={'U-', 0xffff}, 0x28, 0x1) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002580)='cpuset.memory_pressure\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000002d80)={0x0, 0x10, &(0x7f0000002d40)=[@in={0x2, 0x4e23, @remote}]}, &(0x7f0000002dc0)=0x10) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f00000035c0)={0x0, 0x3}, &(0x7f0000003600)=0x8) sendmmsg$inet_sctp(r1, &(0x7f00000036c0)=[{&(0x7f00000025c0)=@in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f0000002c00)=[{&(0x7f0000002600)="4a7d260a28ec8ead58773a58a68780df76d112a96f79dff1037181", 0x1b}, {&(0x7f0000002640)="9716e4d97bf571c5a05560a7954e698a622c1029f652d24507798c5b7ce5bbcb626b25ec3f9c698ab9725427f7c558589d096bb85df01ad01da8e537f23b5958ae9f16e36d5c90457a1a15263c4026b40ab3858d65852eeab10a932c5c1c9427b1bdaf00b34aaafb57b0ed44", 0x6c}, {&(0x7f00000026c0)='{A', 0x2}, {&(0x7f0000002700)="e87f34f909232f7efe9570c293afc416eab42d6e828a1a749338c6a881fb76d1c8c198af9ae4cefb6022740f4fc9cacca6ef51c27f0a94a8da41303366f420e2f7cd104ac61b0ec746d1aa53052241d3d80fa026cff8b387fecdb93dae235067dff8343edba36763a3ec6e6a54977715ea8e6577473445cdb0db5f16309e1e5a21784e533d59b430b25b6ed0d30eeda526d0f57cbd4506f9a3316ce8c40693df2aabe25402ffc89077b04de7ce8dad2482ab4d19b030f4", 0xb7}, {&(0x7f00000027c0)="c4250a9a8805b67f8fd9dcb565e3e0eb1b35f1c02d2fb6e477b0b4bb2b992aae887963d7950d10208ac253f5deb1c053374f17591fe13f3cb732dcd0b26ac653ace9252b0f26cb4c332a463972a0341c378e8ba0ec47a6eaf310efb9a073147f5ea90efd6aa2df5ae4d21a915d7e5f4fa1c0e7d666294ac3df188feffe09c7197c8849ffc9d34c236f0362d62a7bbd21ed954dadd4b8209ad28f79bf5d98a84347be2bc3cfc06dc7877469b2285bf5db2647d6ed4bc7ba4c645347f2a4b1750f4552ee81ba5d069f34f854a916df94ec2ae7b6ecb195e5003a2e4f21cc45df", 0xdf}, {&(0x7f00000028c0)="038f4e2573c5b4d87497e175db73a75d52ced3a3e4f8e74d762f8fbe523efa4032a67e70758836c0483fac79fe232829405517af10df6b1e86342c9f3c86739c15679140d8265d57a1b72cace3d31b209048b1110382e62a17b49c74ff2ade997c278316331182bfab682b2e4f811f0f554a174fc334d6ed9c9b606a668c74d598f6594937c0bb11b9d5f092", 0x8c}, {&(0x7f0000002980)="0c4824e0d7fe70a05eec2fb899be8603ab736d63cbae78ae9022231b5a265c402d46f9ff7d1ef71ec7b34f1bef20c09d2fbae164bc375493dbb3a93d5b2e1805da6defdab9749b3509fe8326bb94bb83a7434cbf138853fcff3716ed04d4e91e951bb84d614c5762b403e952f021c41f90dbd6cfa863f54a00495de912178afd38af4462263514ec84d0281ee04294b15581a335b39c1937c3f1dd9233abc0a84ed8a9bb68fedbff7ef48e0c5c555d3a59c85fb038285e32a9773b65dffbaa5746aa020db811cea21a9da8b1d0de4fbbdf272428dbbce5d6", 0xd8}, {&(0x7f0000002a80)="4513254d11ac27294c06c2802b32efa00a430d14a72aa9de50cece530eb3a2027f405581c26595c625102eaf706fcce46f1b4038e83ce4de32f1f88832f354cbe178edf6d61b05934ea20866ab8b61d48de2aed3456659561fcbc95121650126f04f0b584e28d0a6280ba72a658395531d52db8cc213d7d891b914596d4f9b5c02860a357b6b7da97609d7686b8bee3620b51d50716795e58b9a85bc5ac48a2e650f110f5a6d3daf8ef0433585c4c0a7f591565f4828fb7f05d0edbc885536f88313bb69dc8742cc6af0ff006d7eb5958f0742f11297cf9306c10833d454280a", 0xe0}, {&(0x7f0000002b80)="7f44f04679f49539628c81cb448145892e375ad5f828807ec5a616b17e1e8c4485ac0dadfac70dd4a4334c18ba9e97521f8e4353a699c28ef84173729c190867363ee780c18d60ae39", 0x49}], 0x9, &(0x7f0000002e00)=[@sndrcv={0x30, 0x84, 0x1, {0x0, 0x8, 0x0, 0x6, 0x5, 0x2, 0x2, 0x10001, r2}}], 0x30, 0x8000}, {&(0x7f0000002e40)=@in6={0xa, 0x4e20, 0x8000, @mcast2, 0x6}, 0x1c, &(0x7f0000002f80)=[{&(0x7f0000002e80)="b8af8f29b4b85a7e53f6c10d0ee1efd8e174248285f98dae0a9047115e7db8609462a992a3840e14a61d86cfae3e144ea26cc545d711396d", 0x38}, {&(0x7f0000002ec0)="aa5b3ab617d538796b22c687d95db418cf3e111fd402e0f343fb00a595a29963f16186", 0x23}, {&(0x7f0000002f00)="f453196be8d83e7afb8e66680f1fc61622588b8363d6dfb45698cf8667", 0x1d}, {&(0x7f0000002f40)="1f5d956a49763ed05e6021f6da2db1e3ad63260b67242aabed4a57fa6d66ed0e0f989d8e7635017ef86e65a18f064630f9b5bfe1e3e9d04d", 0x38}], 0x4, &(0x7f0000002fc0)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x11}}, @dstaddrv4={0x18, 0x84, 0x7, @broadcast}, @dstaddrv4={0x18, 0x84, 0x7, @local}, @dstaddrv6={0x20, 0x84, 0x8, @local}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @init={0x18, 0x84, 0x0, {0x80, 0x1, 0x80000001, 0x6}}], 0x98, 0x4010}, {&(0x7f0000003080)=@in6={0xa, 0x4e23, 0x7, @ipv4={[], [], @rand_addr=0x3ff}, 0x242d}, 0x1c, &(0x7f0000003540)=[{&(0x7f00000030c0)="a8f17ee9", 0x4}, {&(0x7f0000003100)="185ca80c255fcbe3b7e329e68327847d8b2d105a613bec3f1a57c4d60e80602bfbb309853504f529df1ed70ebb77ad13efab5ba68c8a50dfb06c6f128fa98f4cd3d97161e3dbe3bf4e4aaa8fc94a0bb75caf87eedbb557b7b363c91b13dbb87a0f732f7306a48a0d9ec0d54dcf5506668d1048237dd446adf718af6366a4080c1a1dc0806fc2e419cafd7e1dfa1bd3ad64938a1cbab9b2303b6a923df9f4d018cb72e39e406e2041", 0xa8}, {&(0x7f00000031c0)="d5803bc633184b62ae2d519237cc9d7ae4c1015c5edd72f05822d9650ef44eb7e97a64ba46504e96e198c9845683bcf7cb5e15501d6444522fb1120637462ff3784d0761edada8a43bb0633c6aaef674b3ebb44270ab164ff801941b8f835c217614d9a01d87cca650fd65406dae47366c6f2da93907b18404e66418510dfdf27547b36460cc3a720ae6c55bd1aa0d06f5", 0x91}, {&(0x7f0000003280)="79752bc9b42d725610934977a8ca3e38b8018c33f0b4d99cf1ce303a82703d6f8d3d553c35f86cfc6916311b29b075854a1e93824419242b5abcdcd524ef3c1a4b3d9f49b52281f8f00932cfc7399e1e742fe0a599dd23dbb358db1d531fda0f17a864391fbe541ca491c199e25aee47e983b34a21193cfd86aafdc958eca39351b67c22416284ea62bd33841a1ce15ff1c927e82f2981398705ce7c68cc28c8e151b773c08c8613dc51f123e4da6dadeeabdb7a54aeaa816bd8d6363aa947bd21ce909175885e01a28abdbf4e8ecccc0e4951bb0ad1cc", 0xd7}, {&(0x7f0000003380)="bedcbe248685bb6750aad13e01ca6f2026ffb2fbfe9aac19c5c77c02b674095c06896c7687279a6e1f1c338b89ab346e90d1b43a72cbe8b547", 0x39}, {&(0x7f00000033c0)="ce995bb884c8611274e75114a999595080bc54d4f816bea9f5bbfbbb4eaf9e71e5ab17c0db082aaa10a181fe2718b7480e4e0a7994eb909b9d4f0af69846d6407260a95d78445e70c8ebf24da1418875c1e329fe026ae69d2b926cc62f5314d5160cd0075addacbd1368565db22751c6a44a9b477f4a98adf2092162fe", 0x7d}, {&(0x7f0000003440)="a931e27a6d96ebbe24ed790f89a758f10e9a048483eb", 0x16}, {&(0x7f0000003480)="d52d75dbd42d7a3fb64e47e32e1dd8aa8579618e7abbc2cfec6f156aacb6756f7ad56d313fbfc71b95cd4004a18150eb2ba98139aadde337dbf70cf1a85722deccd50afd32439bc3584e2c18f15ec84c1bfff06bf5798f09eeba394f7ed673d874d542135bcc97c7f45a2be344bc687ce276ff04403561985e1db8d9fbdc3ab2916f1dbbfa96bf91ed6b9c0b6486ec532ec2ac405296028936b914b3504fde", 0x9f}], 0x8, &(0x7f0000003640)=ANY=[@ANYBLOB="3000000000000000840000000100000005000100020000000700000081000000010000000100000000000000", @ANYRES32=r3, @ANYBLOB="bdd88e634741d06b84000000160000000100000000000000180000000000000084ff0000060000000000000000000000"], 0x60, 0x10}], 0x3, 0xc0) r4 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_bt_bnep_BNEPGETCONNINFO(r1, 0x800442d3, &(0x7f0000000000)={0xfffffffffffffbf6, 0x1, 0x1f, @remote, 'ipddp0\x00'}) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r4, 0xc0104320, &(0x7f0000000100)={0x101, 0x0}) 00:40:41 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5000000) 00:40:41 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) write$RDMA_USER_CM_CMD_GET_EVENT(r1, &(0x7f0000000040)={0xc, 0x8, 0xfa00, {&(0x7f0000000140)}}, 0x10) ioctl$NBD_CLEAR_SOCK(r1, 0xab04) 00:40:41 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) fanotify_mark(r1, 0x10, 0x48000000, r1, &(0x7f0000000040)='./file0\x00') ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:41 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2302) 00:40:41 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) [ 895.930862][T12408] kcapi: manufacturer command 257 unknown. 00:40:42 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() open$dir(&(0x7f0000000040)='./file0\x00', 0x10000, 0x4) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/vs/mxpire_nodest_conn\x007\x8b', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6000000) [ 895.991057][T12490] kcapi: manufacturer command 257 unknown. 00:40:42 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x40086607, &(0x7f0000000180)=0x1) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x88000, 0x0) getsockopt$inet_sctp6_SCTP_MAXSEG(0xffffffffffffffff, 0x84, 0xd, &(0x7f0000000100)=@assoc_value={0x0, 0x6}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000000200)={r3, 0xffffffbffffff2fe}, &(0x7f00000001c0)=0x8) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) openat$capi20(0xffffffffffffff9c, &(0x7f0000000100)='/dev/capi20\x00', 0x0, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xb, &(0x7f0000000040)="e184a800000000c8"}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x23db) 00:40:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:42 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) gettid() ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008916, &(0x7f0000000100)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000040)={0x80, 0x0}) 00:40:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7000000) 00:40:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_opts(r1, 0x29, 0x3f, &(0x7f0000000140)=@dstopts={0x2f, 0x17, [], [@hao={0xc9, 0x10, @rand_addr="f47d10276d02595377218613ef421c7a"}, @pad1, @generic={0x6, 0x8b, "595583338f8a45538a203a53de2e089c16bd11d53349510e27d97cc44c1c9c82076344bf280a4a4559fd91ebc967c88fc8c5cbc3ac0457644aec978b27a21164e3929af2a2d49f0081a3afa8795e60f456fd9ec8727a033666fe1b44e5838b704e4e06b46df5b59fd314604ec9a85b9e3e16590b21b1b7ac3315d3c9932c58e935ad7b91864d29c8a4f084"}, @hao={0xc9, 0x10, @ipv4={[], [], @loopback}}, @enc_lim={0x4, 0x1, 0x1f}, @ra={0x5, 0x2, 0x4}]}, 0xc8) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x20) inotify_init() ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xc, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4000) 00:40:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) [ 896.365271][T12700] kcapi: manufacturer command 128 unknown. 00:40:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x781aff3) 00:40:42 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl(r0, 0x1000028912, &(0x7f00000000c0)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$VIDIOC_DQEVENT(r2, 0x80885659, &(0x7f00000001c0)={0x0, @motion_det}) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r1, 0xc08c5336, &(0x7f0000000100)={0x4, 0xff, 0x81, 'queue1\x00', 0x1}) setsockopt$IP_VS_SO_SET_ADDDEST(r1, 0x0, 0x487, &(0x7f0000000280)={{0xbf, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x2, 'lblc\x00', 0x8, 0x7, 0x5a}, {@multicast2, 0x4e20, 0x10000, 0x2, 0x10001, 0x2}}, 0x44) 00:40:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040)='SEG6\x00') ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4800) 00:40:42 executing program 5: socket$inet_udplite(0x2, 0x2, 0x88) ioctl(0xffffffffffffffff, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:42 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) socket$inet_udp(0x2, 0x2, 0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$sequencer(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/sequencer\x00', 0x400, 0x0) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x84800) ioctl$TIOCSWINSZ(r3, 0x5414, &(0x7f0000000100)={0x382, 0x4, 0x4d03febb, 0x592d0610}) getsockname$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote}, &(0x7f00000001c0)=0x1c) 00:40:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r1, 0x0, 0x486, &(0x7f0000000040), &(0x7f0000000080)=0xc) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4c00) 00:40:42 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9000000) 00:40:42 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_inet_tcp_SIOCATMARK(r1, 0x8905, &(0x7f0000000040)) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x1f, r0, 0x0, 0x0) 00:40:42 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6800) 00:40:42 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:42 executing program 4: r0 = syz_open_dev$adsp(&(0x7f00000001c0)='/dev/adsp#\x00', 0x59, 0x2200) setsockopt$netrom_NETROM_N2(r0, 0x103, 0x3, &(0x7f0000000200)=0x8001, 0x4) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) syz_init_net_socket$ax25(0x3, 0x7, 0xcd) ioctl(r2, 0x3, &(0x7f00000000c0)="0adc1f123c123f3188b070") r3 = syz_open_dev$dmmidi(&(0x7f0000000240)='/dev/dmmidi#\x00', 0x3fe, 0x80202) ioctl$LOOP_SET_STATUS(r3, 0x4c02, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x200, 0x6, 0xe, 0x15, "31e7efc05a729d8c3cbd7e44fc2ce91ff10eb9f87284f7bbb17ef2ee660307ecc948aefa66423309bf1082bcc1f2abf58c8a63d13221e9636f8a69ae725d551b", "aa6469f3e43763b0e43967fac87109fe8bf254d9e7d252dc6202ea9afdb08b62", [0x3, 0x10000]}) ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:42 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x607d07ad, 0x100) ioctl$KDGKBSENT(r1, 0x4b48, &(0x7f0000000080)={0xfffffffffffffffc, 0x6, 0x7}) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa000000) 00:40:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6c00) 00:40:43 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_PTRACER(0x59616d61, r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) pipe(&(0x7f0000000040)) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x1c1b83, 0x0) ioctl$SG_SET_TIMEOUT(r1, 0x2201, &(0x7f0000000080)=0xa77) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) syz_extract_tcp_res(&(0x7f0000000000), 0x20, 0x800) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000300)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00\xca\xdb\xb1v\x8eo\xff\',tL', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0xffffffffffffffff, r0, 0x9, 0x1f) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x7fffffff) 00:40:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7400) 00:40:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0x4200, r0, 0x6, 0x20) pipe(0x0) tkill(r0, 0x4) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r1, 0x84, 0x22, &(0x7f0000000040)={0x0, 0x8, 0x3, 0x9, 0x0}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000001c0)=ANY=[@ANYRES32=r2, @ANYBLOB="fcff0700073502ade6e7a009f0000700010038635532a5d4c0b2347ae683167d96b0ff98560a5d57208781b6c58ae6c8b5c2c27c734de502c457e2cee7b3e5c1bf9f8f30f5e3520e6b01de8495c3fc70bc79b36396c5ed88623bbc78e96a1c60ee1d761e85f414d6730ff9964ca9d290009e"], &(0x7f0000000180)=0x16) ptrace$cont(0x18, r0, 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) pipe2(&(0x7f0000000140), 0x4000) 00:40:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xb5463c2) 00:40:43 executing program 4: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 00:40:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x0, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:43 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0x40042409, 0x0) ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000040)="24000000220007031dfffd946f610500000000000543000000000000421ba3a20400ff7e280000001100ff5613d3475b", 0x30}], 0x1}, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f00000002c0)={0xffffffffffffffff, 0x2, 0x1, 0x3, 0x0}, 0x20) mount(0x0, 0x0, &(0x7f0000000180)='nfs\x00', 0x0, &(0x7f000000a000)) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = add_key(&(0x7f00000001c0)='blacklist\x00', &(0x7f0000000200)={'syz', 0x2}, &(0x7f0000000240)="038b8759ad8927d2356dc08d497848e7d111b53c1b303f223d090b9a3bea2625ad56973fac27fc2f2a732c36a7435c6d429a6cb8e7a4749f5568f40ab22b5cb47d750a839f0c1e66b6a16c038c25521013a0000a66fd298cfe02580f6f58", 0x5e, 0x0) request_key(&(0x7f0000000080)='user\x00', &(0x7f0000000140)={'syz', 0x0}, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', r1) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_FRAGMENT_INTERLEAVE(r2, 0x84, 0x12, &(0x7f0000000040)=0x3, 0x4) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a00) 00:40:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:43 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xb5fe48f) 00:40:43 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") setsockopt$IP_VS_SO_SET_STOPDAEMON(r1, 0x0, 0x48c, &(0x7f00000000c0)={0x3, 'veth0\x00'}, 0x18) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(r1, 0x0, 0x275) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000040)={0x0, 0x2}, &(0x7f0000000080)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r1, 0x84, 0xa, &(0x7f0000000140)={0x7fffffff, 0x7fffffff, 0x201, 0x7, 0xe827, 0x265c, 0xffffffffffffffdf, 0x1, r2}, 0x20) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdb23) 00:40:43 executing program 3: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) add_key(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc) ioctl$DRM_IOCTL_GET_MAP(r1, 0xc0286404, &(0x7f0000000040)={&(0x7f0000ffc000/0x1000)=nil, 0x9, 0x0, 0x5, &(0x7f0000ffd000/0x1000)=nil, 0x20}) kcmp(r0, r0, 0x5, r1, r1) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$vcsa(&(0x7f00000000c0)='/dev/vcsa#\x00', 0x9, 0x105000) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000140)=0x14) getpeername(r2, &(0x7f0000000180)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @local}, &(0x7f0000000200)=0x80) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) [ 897.801575][T13371] cgroup: fork rejected by pids controller in /syz2 00:40:43 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x7, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(r1, 0x0, 0xfffffffffffffdd1) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:43 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xb5463c2) 00:40:43 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1c2167) 00:40:43 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/ppp\x00', 0x800, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f00000015c0)={0xffffffffffffff9c}) getsockopt$inet_mreqn(r2, 0x0, 0x23, &(0x7f0000001600)={@rand_addr, @loopback}, &(0x7f0000001640)=0xc) ioctl$PPPIOCGFLAGS1(r1, 0x8004745a, &(0x7f00000001c0)) get_thread_area(&(0x7f00000000c0)={0x1000, 0x1000, 0xffffffffffffffff, 0x5, 0x8000, 0x9, 0xb000000000000000, 0x9, 0xfffffffffffffffe, 0x8000}) r3 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000013c0)='/proc/capi/capi20ncci\x00', 0x4100, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000001440)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000001400)={0xffffffffffffffff}, 0x13f, 0x1009}}, 0x20) write$RDMA_USER_CM_CMD_ACCEPT(r3, &(0x7f0000001480)={0x8, 0x120, 0xfa00, {0x1, {0xf644, 0x0, "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", 0x0, 0xb3f, 0x9, 0x0, 0x0, 0x100, 0x1}, r4}}, 0x128) r5 = socket$inet_udplite(0x2, 0x2, 0x88) r6 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rfkill\x00', 0x400140, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r6, 0xc0206434, &(0x7f0000001340)={0x4, 0x0, 0x10001, 0x6b5674c9}) ioctl$DRM_IOCTL_AGP_BIND(r6, 0x40106436, &(0x7f0000001380)={r7, 0x4}) ioctl$TIOCGSOFTCAR(r6, 0x5419, &(0x7f0000000140)) ioctl(r5, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") write$UHID_CREATE(r6, &(0x7f0000001200)={0x0, 'syz0\x00', 'syz0\x00', 'syz0\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xec\x00', &(0x7f0000000200)=""/4096, 0x1000, 0xdea0, 0x0, 0x0, 0x3, 0x47ed2ced}, 0x120) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:43 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:43 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xc4eaf9e) 00:40:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ioctl$TIOCGETD(r1, 0x5424, &(0x7f0000000040)) 00:40:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:44 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x41619d) 00:40:44 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000100)=0xc) 00:40:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xcc9cc0d) 00:40:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:44 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = syz_open_dev$cec(&(0x7f00000000c0)='/dev/cec#\x00', 0x2, 0x2) getsockopt$bt_sco_SCO_OPTIONS(r2, 0x11, 0x1, &(0x7f0000000100)=""/57, &(0x7f0000000140)=0x39) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r2, 0x84, 0xa, &(0x7f0000000180)={0x9ffb, 0xdb1, 0x8208, 0x42, 0x5, 0x400, 0x7ff, 0x6, 0x0}, &(0x7f00000001c0)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r2, 0x84, 0x6, &(0x7f0000000200)={r3, @in={{0x2, 0x4e20, @rand_addr=0x4}}}, 0x84) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x14206, r0, 0x9, 0x3) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ioctl$int_in(r1, 0x0, &(0x7f0000000040)) dup2(r1, r1) ptrace$setregs(0xd, r0, 0xfffffffffffffffe, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1000000) 00:40:44 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:44 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$vsock(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vsock\x00', 0x4201, 0x0) ioctl$RTC_PIE_OFF(r2, 0x7006) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f00000002c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r1, &(0x7f0000000380)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x14, r3, 0x102, 0x70bd27, 0x25dfdbff}, 0x14}}, 0x4000000) sendto(r2, &(0x7f0000000100)="0a56fae53b12b868a4654148b42118147450905bca6d6b26d2a3eeb0ec740aeeb73f71206be9953264ea08308f01b6a99bfd2ad77ff4dc82a3a1468c6f2b911b32898b501bdd8051389783a6960015c9c2aad204ca803a2cdf12e96fbedc6c2e11ee2a4e61f9aa1941cf1fddbe541311a37dfcf3171f8bcd5ada116fb8712939fe7272577bc4886ddcc57d4cdccc8dcfe01aa9618a9c3d9450a8811710c53531bec9c4b6a83d5bf92e97f306c158fdb582c7c52ebb005774425f476af67c8a9d27d1711a02d776a2bc5f5d2589554f81fad43fab", 0xd4, 0x4000, &(0x7f0000000200)=@rxrpc=@in6={0x21, 0x0, 0x2, 0x1c, {0xa, 0x4e23, 0x0, @mcast2, 0x80000001}}, 0x80) getsockopt$inet6_dccp_int(r2, 0x21, 0x7, &(0x7f00000003c0), &(0x7f0000000400)=0x4) 00:40:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f0000000040)=0x20, 0x4) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x11bfbe5) 00:40:44 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:44 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xce67379) 00:40:44 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:44 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000140)='/dev/capi20\x00', 0x803, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:44 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x20040, 0x0) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000080), &(0x7f0000000140)=0xc) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)='trusted.overlay.opaque\x00', &(0x7f0000000280)='y\x00', 0x2, 0x2) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$sock_ifreq(r2, 0x89ff, &(0x7f00000001c0)={'caif0\x00', @ifru_data=&(0x7f0000000180)="c79e1deb4e81a70f6e34ab309d1b45f178cd6641903256cbb9111b75ada09a6b"}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:44 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1d525eb) 00:40:44 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) 00:40:44 executing program 4: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20ncci\x00', 0x2800, 0x0) execveat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000200)=[&(0x7f00000001c0)='nodevsystem{\x00'], &(0x7f0000000340)=[&(0x7f0000000240)='/dev/qat_adf_ctl\x00', &(0x7f0000000280)='/dev/qat_adf_ctl\x00', &(0x7f00000002c0)='/posix_acl_access\x00', &(0x7f0000000300)='\\mime_typevboxnet0-*$eth0wlan0\\.\x00'], 0x800) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r2 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/qat_adf_ctl\x00', 0x8000, 0x0) bind$netlink(r2, &(0x7f0000000100)={0x10, 0x0, 0x25dfdbfc}, 0xc) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:45 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdccc90c) 00:40:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2000000) 00:40:45 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) 00:40:45 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) recvmsg$kcm(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000000280)=[{&(0x7f0000000140)=""/48, 0x30}, {&(0x7f0000000180)=""/245, 0xf5}], 0x2}, 0x0) accept4$vsock_stream(r2, &(0x7f0000000300)={0x28, 0x0, 0x0, @reserved}, 0x10, 0x800) ioctl(r1, 0x100000890e, &(0x7f0000000340)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:45 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:45 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2040000) 00:40:45 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) 00:40:47 executing program 2: memfd_create(&(0x7f0000000040)='nodev)!mime_type%\'+\x00', 0x7) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:47 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdece892) 00:40:47 executing program 4: recvmsg$kcm(0xffffffffffffff9c, &(0x7f00000036c0)={&(0x7f00000000c0)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff}}, 0x80, &(0x7f0000003600)=[{&(0x7f0000000140)=""/233, 0xe9}, {&(0x7f0000000240)=""/4096, 0x1000}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/145, 0x91}, {&(0x7f0000002300)}, {&(0x7f0000002340)=""/75, 0x4b}, {&(0x7f00000038c0)=""/141, 0x8d}, {&(0x7f0000002480)=""/95, 0x5f}, {&(0x7f0000002500)=""/4096, 0x1000}, {&(0x7f0000003500)=""/234, 0xea}], 0xa}, 0x20) getresuid(&(0x7f0000003700), &(0x7f0000002440), &(0x7f00000049c0)=0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f00000037c0)={{{@in=@empty, @in=@rand_addr=0x5, 0x4e24, 0x0, 0x4e21, 0x0, 0xa, 0x0, 0x0, 0xff, 0x0, r1}, {0x2, 0x7ff, 0x2, 0x4, 0x20000000, 0x9, 0x4, 0xd4}, {0x7, 0x3, 0xc0d, 0x5507567e}, 0xbb, 0x6e6bbd, 0x0, 0x0, 0x3, 0x3}, {{@in=@remote, 0x4d6, 0x6c}, 0xa, @in=@remote, 0x3504, 0xf8afebf473fba853, 0x2, 0x5, 0x6e00000000, 0x4}}, 0xe8) openat$full(0xffffffffffffff9c, &(0x7f0000003740)='/dev/full\x00', 0x20000, 0x0) r2 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000003980)=ANY=[@ANYRES32=0x0, @ANYBLOB="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"], &(0x7f00000023c0)=0x1008) setsockopt$inet_sctp6_SCTP_RESET_ASSOC(r0, 0x84, 0x78, &(0x7f0000002400)=r4, 0x4) chdir(&(0x7f0000002300)='./file0\x00') ioctl$CAPI_MANUFACTURER_CMD(r2, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:47 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3000000) 00:40:47 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:47 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0}) 00:40:48 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/hwrng\x00', 0x400, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000100)) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3f6b181) 00:40:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:48 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0}) 00:40:48 executing program 2: r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000001c0)={'netdevsim0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in=@initdev, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in=@multicast2}}, &(0x7f0000000380)=0xe8) accept(r1, &(0x7f00000003c0)=@hci={0x1f, 0x0}, &(0x7f0000000440)=0x80) getsockname$packet(r1, &(0x7f0000000880)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000008c0)=0x14) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000900)={0x0, @empty, @remote}, &(0x7f0000000940)=0xc) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000a40)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f0000000b40)=0xe8) getpeername$packet(r1, &(0x7f0000000c40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000c80)=0x14) getpeername$packet(r1, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000d00)=0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000d40)={'gre0\x00', 0x0}) getsockname$packet(r1, &(0x7f0000000d80)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000dc0)=0x14) getsockopt$inet_mreqn(r1, 0x0, 0x23, &(0x7f0000006640)={@multicast2, @loopback, 0x0}, &(0x7f0000006680)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f00000066c0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(r1, 0x0, 0x27, &(0x7f0000006700)={@remote, @multicast1, 0x0}, &(0x7f0000006740)=0xc) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000006840)={{{@in6=@local, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@broadcast}}, &(0x7f0000006940)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x0, &(0x7f0000006980)={@dev, 0x0}, &(0x7f00000069c0)=0x14) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000007380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x2005400}, 0xc, &(0x7f0000007340)={&(0x7f0000006a00)={0x938, r2, 0x200, 0x70bd29, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x230, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xffff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r7}, {0xbc, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x7}}}]}}, {{0x8, 0x1, r8}, {0x38, 0x2, [{0x34, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x4}}}]}}, {{0x8, 0x1, r9}, {0x180, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x8, 0x8000, 0xfffffffffffffffc, 0x1}, {0x20400000000000, 0x8000, 0x3, 0x7ff}]}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x3f}}}, {0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r11}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x178, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x40}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x100}}}]}}, {{0x8, 0x1, r14}, {0x70, 0x2, [{0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x450, 0xfffffffffffffffc, 0x0, 0x3ff}, {0x5, 0x100000000, 0x6}, {0x0, 0x2, 0x8, 0xc23}, {0x5, 0x5, 0x1, 0x7}, {0x1, 0x10001, 0x3, 0x1}, {0xdb, 0x0, 0x10000, 0x4}, {0x9, 0x573, 0x4}]}}}]}}, {{0x8, 0x1, r15}, {0x1e0, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r16}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffff8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r17}, {0x78, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x401}}}, {0x3c, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0xc, 0x4, 'random\x00'}}}]}}]}, 0x938}, 0x1, 0x0, 0x0, 0x8000}, 0x4008004) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r1, 0x0, 0x80, &(0x7f0000000200)=@filter={'filter\x00', 0xe, 0x4, 0x6a0, [0x0, 0x20000e00, 0x20000ed0, 0x20001200], 0x0, &(0x7f0000000140), &(0x7f0000000e00)=[{0x0, '\x00', 0x0, 0xfffffffffffffffe, 0x1, [{{{0x5, 0x10, 0xe8ff, 'team0\x00', 'veth1_to_bond\x00', 'bond0\x00', 'bond0\x00', @dev={[], 0x1c}, [0x0, 0xff, 0x0, 0xff, 0xff, 0xff], @dev={[], 0x19}, [0xff, 0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0x70, 0xa0}}, @common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x20}}}}]}, {0x0, '\x00', 0x1, 0xfffffffffffffffe, 0x2, [{{{0x15, 0x10, 0x88ff, 'vlan0\x00', 'teql0\x00', 'eql\x00', 'syzkaller0\x00', @dev={[], 0x2a}, [0xff, 0x0, 0x0, 0x0, 0x0, 0xff], @dev={[], 0x1b}, [0xff, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xa0, 0xe8}, [@common=@NFQUEUE0={'NFQUEUE\x00', 0x8, {{0x10001}}}]}, @common=@ERROR={'ERROR\x00', 0x20, {"e74621629b99cbb67e56ef5d166c81b7df5b185b76f2dda2f27c39617c2f"}}}, {{{0x1d, 0x1, 0x0, 'gre0\x00', 'veth1\x00', 'veth0_to_bridge\x00', 'nr0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}, [0x0, 0x0, 0x0, 0x0, 0xff], @local, [0x0, 0xff, 0x0, 0xff, 0xff], 0x70, 0xe8, 0x218}, [@common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}, @common=@RATEEST={'RATEEST\x00', 0x20, {{'syz0\x00', 0x1, 0x2, 0x6}}}]}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0xffffffffffff7fff, 'system_u:object_r:usbmon_device_t:s0\x00'}}}}]}, {0x0, '\x00', 0x3, 0x0, 0x1, [{{{0x7, 0x40, 0xe8f7, 'lo\x00', 'ip6_vti0\x00', 'bond_slave_0\x00', 'team0\x00', @empty, [0xff, 0xff, 0xff, 0xff, 0xff], @dev={[], 0x11}, [0x0, 0x0, 0x0, 0xff, 0xff], 0x110, 0x110, 0x240, [@stp={'stp\x00', 0x48, {{0x9, {0xfffffffffffffb1d, 0x7f, 0x4, @random="e3462b05b2c0", [0xff, 0xff, 0xff, 0xff, 0x0, 0xff], 0x9, 0x5, 0x7, 0x5, @empty, [0xff, 0xff, 0x0, 0xff, 0xff, 0xff], 0x4e23, 0x4e20, 0x2, 0x0, 0x100000000, 0xffff, 0x4, 0xffffffffffffffe0, 0x9, 0x3e3}, 0x24, 0x840}}}, @connlabel={'connlabel\x00', 0x8, {{0x7, 0x2}}}]}}, @common=@SECMARK={'SECMARK\x00', 0x108, {{0x1, 0x1, 'system_u:object_r:auditd_exec_t:s0\x00'}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffc}]}, 0x718) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4000000) 00:40:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() sched_getparam(r0, &(0x7f0000000040)) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdf9176d) 00:40:48 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0x200, 0x0}) 00:40:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:48 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r0}) [ 902.402202][T14299] kcapi: manufacturer command 512 unknown. 00:40:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x497c6ac) 00:40:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0xffffffff, @hyper}, 0x10, 0x80800) sendto(r1, &(0x7f0000000140)="656fab79dd4bd5b9d8f8dcff4d8a20580835e8bdc43c52b54f5295c80d51383b3f1ab0f883dbed35272290755964274f6db0346a3ed59457b09f728db934a22874b4d8752dae1c7fe78d61e5cc6055766614a195ed2bc19d53c9072542656e2776af19510830b7dd58fdec858f6b4a82a51aa645ec38f88dbe452d8f9d8786a9ca291c8b341b6ea5e6423e8889c539ef00eb8f054581cdfc68b713d1408081185db14fda71a82fad85d2ce681e20083fb309eebdd8ef318d073180993282339f5b88ad25e4d4eb8cabb38e1f22cc119ae8e66475eea8a69731b017c7a4", 0xdd, 0x1, &(0x7f0000000240)=@sco={0x1f, {0x100000001, 0x101, 0x8, 0xb9, 0x7, 0x2}}, 0x80) wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:48 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xe2fb799) 00:40:48 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/capi20\x00', 0xa0001, 0x0) r1 = dup3(r0, r0, 0x80000) r2 = syz_genetlink_get_family_id$nbd(&(0x7f00000001c0)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="02002cbd7000fcdbdf25030000000800050000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x20040000) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r3, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) socketpair(0x9, 0x7, 0x8, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCGIFMTU(r5, 0x8921, &(0x7f0000000100)) bind$netlink(r4, &(0x7f0000000140)={0x10, 0x0, 0x25dfdbfc, 0x8000}, 0xc) 00:40:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:48 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4d3909f) 00:40:48 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) getsockopt$inet_mtu(r1, 0x0, 0xa, &(0x7f00000000c0), &(0x7f0000000100)=0x4) 00:40:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) signalfd(r1, &(0x7f0000000040)={0x2}, 0x8) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) ptrace$peekuser(0x3, r0, 0x9) 00:40:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:48 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:48 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x10000000) 00:40:48 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/sys/net/ipv4/vs/sync_refresh_period\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:48 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b0") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:48 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5000000) 00:40:48 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000480)='cpuset.effective_cpus\x00', 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_CLIENT_INFO(r1, 0xc0bc5310, &(0x7f00000004c0)) r2 = add_key(&(0x7f00000000c0)='cifs.idmap\x00', &(0x7f0000000100)={'syz', 0x0}, &(0x7f0000000340)="98c9b76235422a9a5146968bba21f0e2d40f823a551418defe509fd1f09a9aae5adc5efeaa015142cb6b9809903a34e4b8229e7b8c3714e1e643a6c52081f62e52d12f8aeacc9d413e973ea39f673d229c5514c94a689924c5cc3a7f87927852d4533a22f29be552ee97157762ce8952f51cec07fa5f498ad745f4882639fda1551bf9cd81ba38c1e731f8455402b0686c046534db641d953a0f4b34cf78f04033b8f3f0fdcb8635dbe8546da96b8bb8a3ec5f04c27358bac75988609275992a0bf1b139836ee7c1c5da877c025231975faa9df205", 0xd5, 0xfffffffffffffffb) r3 = request_key(&(0x7f00000001c0)='rxrpc\x00', &(0x7f0000000240)={'syz', 0x3}, &(0x7f0000000440)='{wlan1mime_type-&.&em1\x00', 0xffffffffffffffff) keyctl$reject(0x13, r2, 0x9, 0x4, r3) r4 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r4, 0x1000000912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000300)='/dev/qat_adf_ctl\x00', 0x287c, 0x0) ioctl$DRM_IOCTL_AGP_ENABLE(r1, 0x40086432, &(0x7f0000000200)=0x3) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r5 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000140)='/proc/capi/capi20\x00', 0x8000, 0x0) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000180)) getsockopt$bt_l2cap_L2CAP_LM(r4, 0x6, 0x3, &(0x7f00000002c0), &(0x7f0000000280)=0x4) 00:40:49 executing program 3: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) write$UHID_CREATE(r1, &(0x7f0000000240)={0x0, 'syz0\x00', 'syz0\x00', 'syz1\x00', &(0x7f00000001c0)=""/120, 0x78, 0x4, 0x8, 0x100, 0xed4, 0x2}, 0x120) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) r2 = syz_open_dev$vcsn(&(0x7f0000000040)='/dev/vcs#\x00', 0x7, 0x80800) accept$nfc_llcp(r2, &(0x7f0000000140), &(0x7f0000000080)=0x60) kcmp$KCMP_EPOLL_TFD(r0, r0, 0x7, r2, &(0x7f0000000380)={r1, r2, 0x1000}) 00:40:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6000000) 00:40:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/capi20\x00', 0x430280, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/capi/capi20\x00', 0x8381, 0x0) setsockopt$bt_BT_FLUSHABLE(r2, 0x112, 0x8, &(0x7f0000000100)=0x80000000, 0xff99) ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1013a454) 00:40:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7000000) 00:40:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sloppy_tcp\x00', 0x2, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ioctl$KVM_CHECK_EXTENSION_VM(r1, 0xae03, 0x400) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:49 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/rtc0\x00', 0x40002, 0x0) ioctl$VIDIOC_UNSUBSCRIBE_EVENT(r0, 0x4020565b, &(0x7f0000000100)={0x8001005, 0x9, 0x1}) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r1, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x781aff3) 00:40:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x11271bd4) 00:40:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000001400)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') preadv(r2, &(0x7f00000017c0), 0x21e, 0x0) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:40:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9000000) 00:40:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/sync_qlen_max\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ioctl$IOC_PR_RELEASE(r1, 0x401070ca, &(0x7f0000000240)={0x0, 0x1, 0x1}) r2 = semget$private(0x0, 0x0, 0x23) semctl$SEM_STAT(r2, 0x7, 0x12, &(0x7f0000000300)=""/223) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x9, r0, 0x2, 0x404) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x34ee, 0x5, 0x4c, 0x9, 0x7d26, 0x2, 0x2, {0x0, @in6={{0xa, 0x4e21, 0x7, @empty}}, 0x7, 0x2, 0x9, 0x3, 0x8}}, &(0x7f0000000000)=0xb0) perf_event_open(&(0x7f0000000280)={0x2, 0x70, 0x5, 0x6, 0xf754, 0x1ff, 0x0, 0x1ff, 0x850, 0x0, 0x400, 0x8000, 0x8, 0x9, 0x100, 0x9, 0x8, 0x1000, 0x205, 0x3, 0x6, 0x18, 0x9, 0x3, 0x4, 0x9, 0x4, 0x2, 0x401, 0x82ed, 0x101, 0x100, 0x3, 0x100000001, 0x4b9, 0x4, 0x8000, 0x345e0ddd, 0x0, 0xa817, 0x7, @perf_config_ext={0x80, 0x6}, 0x4000, 0x2, 0x4, 0x6, 0x100000000, 0x3, 0xca}, r0, 0xc, r1, 0xb) ptrace$cont(0x3f, r0, 0x1ff, 0x40) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f0000000080)={r3, 0xc84c}, &(0x7f0000000200)=0x8) r4 = syz_open_dev$vbi(&(0x7f0000000400)='/dev/vbi#\x00', 0x3, 0x2) ioctl$PPPIOCGUNIT(r4, 0x80047456, &(0x7f0000000440)) 00:40:49 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x13664982) 00:40:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:49 executing program 4: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000000c0)='net/udp6\x00') getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, &(0x7f0000000100)={0x0, @in={{0x2, 0x7fff, @local}}, [0x2, 0x6, 0xfffffffffffffffc, 0x40, 0x4, 0x2, 0x101, 0xa6e1, 0x7ff, 0x9, 0xfffffffffffffffc, 0x3, 0x7ff, 0x9, 0xe558]}, &(0x7f0000000200)=0x100) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, &(0x7f0000000240)={r3, 0x5, 0x9}, 0x8) 00:40:49 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa000000) 00:40:49 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:49 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dsp\x00', 0x80000, 0x0) r1 = syz_genetlink_get_family_id$team(&(0x7f0000000340)='team\x00') getsockname$packet(0xffffffffffffff9c, &(0x7f0000000380)={0x11, 0x0, 0x0}, &(0x7f00000003c0)=0x14) accept$packet(0xffffffffffffff9c, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000440)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x14, &(0x7f0000000600)={@initdev, 0x0}, &(0x7f0000000640)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000680)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000006c0)={'vcan0\x00', 0x0}) getsockopt$inet_pktinfo(0xffffffffffffff9c, 0x0, 0x8, &(0x7f0000000700)={0x0, @rand_addr, @empty}, &(0x7f0000000740)=0xc) getsockname$packet(0xffffffffffffffff, &(0x7f0000000780)={0x11, 0x0, 0x0}, &(0x7f00000007c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, &(0x7f0000000ac0)={@ipv4={[], [], @multicast1}, 0x0}, &(0x7f0000000b00)=0x14) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000000cc0)={@loopback, @loopback, 0x0}, &(0x7f0000000d00)=0xc) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000d40)={0x0, @local}, &(0x7f0000000d80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000dc0)={'team0\x00', 0x0}) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000ec0)={@local, @local, 0x0}, &(0x7f0000000f00)=0xc) sendmsg$TEAM_CMD_NOOP(r0, &(0x7f0000001400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x800100}, 0xc, &(0x7f00000013c0)={&(0x7f0000000f40)={0x444, r1, 0x704, 0x70bd26, 0x25dfdbfb, {}, [{{0x8, 0x1, r2}, {0x44, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x689}}, {0x8}}}]}}, {{0x8, 0x1, r3}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xf6f}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}]}}, {{0x8, 0x1, r5}, {0x44, 0x2, [{0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r6}}}]}}, {{0x8, 0x1, r7}, {0x280, 0x2, [{0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfff}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r8}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r9}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x977, 0x0, 0x3, 0x100}]}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x8, 0xfffffffffffffeff, 0x2, 0xfffffffffffffff7}, {0x4, 0x40000000000000, 0x8}, {0x8b, 0x7fff, 0x705, 0xdb7}, {0x3f, 0x81, 0x8, 0xd3}, {0x996, 0x3, 0x7ff, 0xffff}]}}}]}}, {{0x8, 0x1, r13}, {0x88, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x0, 0x3f, 0x0, 0x1000}, {0x100000000, 0x6, 0x55f, 0x7}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0xcd5f}}, {0x8}}}]}}]}, 0x444}, 0x1, 0x0, 0x0, 0x800}, 0x40) r14 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r14, 0x0, 0x0) r15 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_JOIN_MCAST(r15, &(0x7f00000001c0)={0x16, 0x98, 0xfa00, {&(0x7f0000000080)={0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0x10, 0x0, @in6={0xa, 0x4e23, 0x1ff, @mcast2, 0x7f}}}, 0xa0) write$RDMA_USER_CM_CMD_LEAVE_MCAST(r15, &(0x7f0000000140)={0x11, 0x10, 0xfa00, {&(0x7f0000000040), r16}}, 0x18) r17 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fallocate(r15, 0x0, 0x200000000000000, 0x1000f4) open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) mlockall(0x1) lseek(r17, 0x0, 0x4) pipe(0x0) tkill(r14, 0x4) ptrace$cont(0x18, r14, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r14, 0x0, &(0x7f0000000080)) syz_open_dev$video(&(0x7f0000000480)='/dev/video#\x00', 0x8000, 0x0) tee(r15, r17, 0x4000006, 0x4) ptrace$cont(0x20, r14, 0x0, 0x0) 00:40:49 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:50 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:40:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x15e53835) [ 904.089953][ T26] audit: type=1804 audit(1552264850.054:46): pid=15068 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir259372811/syzkaller.YCoBwm/649/bus" dev="sda1" ino=17026 res=1 00:40:50 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xb5463c2) 00:40:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:50 executing program 3: openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:50 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:40:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x197e03db) 00:40:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xb5fe48f) 00:40:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x0) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:40:50 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:40:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x199881c3) 00:40:50 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/loop-control\x00', 0x280, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f0000000240)={@empty, @multicast2, 0x0}, &(0x7f0000000280)=0xc) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000002c0)={'hsr0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000400)={{{@in=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@initdev}}, &(0x7f0000000500)=0xe8) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001d00)={{{@in6=@mcast1, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@mcast1}}, &(0x7f0000001e00)=0xe8) accept4$packet(r1, &(0x7f0000001e40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000001e80)=0x14, 0x1d74aea71895ef15) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f0000001ec0)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@local}}, &(0x7f0000001fc0)=0xe8) accept$packet(r1, &(0x7f0000002000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000002040)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002080)={{{@in6=@ipv4={[], [], @broadcast}, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in6=@local}}, &(0x7f0000002180)=0xe8) getsockopt$inet6_mreq(r1, 0x29, 0x1f, &(0x7f00000021c0)={@loopback, 0x0}, &(0x7f0000002200)=0x14) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000002240)={{{@in, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}}}, &(0x7f0000002340)=0xe8) accept$packet(r1, &(0x7f0000002380)={0x11, 0x0, 0x0}, &(0x7f00000023c0)=0x14) accept4$packet(r1, &(0x7f0000002400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000002440)=0x14, 0x800) getsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000002480)={{{@in=@dev, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@local}, 0x0, @in=@dev}}, &(0x7f0000002580)=0xe8) accept4$packet(r1, &(0x7f0000002740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000002780)=0x14, 0x80800) sendmsg$TEAM_CMD_NOOP(r1, &(0x7f0000002cc0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000002c80)={&(0x7f00000027c0)={0x4b4, r2, 0x603, 0x70bd2a, 0x25dfdbfe, {}, [{{0x8, 0x1, r3}, {0x170, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x9}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r5}}, {0x8}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r6}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r7}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r8}, {0x48, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x7, 0x2e, 0xfff, 0xf0}, {0x401, 0x4, 0x7ff, 0xada1}]}}}]}}, {{0x8, 0x1, r9}, {0xbc, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xffffffffffffff14}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r11}}, {0x8}}}]}}, {{0x8, 0x1, r12}, {0x40, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}, {{0x8, 0x1, r13}, {0xb8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r14}}, {0x8}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r15}, {0x104, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r16}}, {0x8}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0xfe}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}]}}]}, 0x4b4}, 0x1, 0x0, 0x0, 0x80}, 0x0) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:50 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x3, 0x20000004, 0x9c, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:50 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xc4eaf9e) 00:40:50 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:50 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x19ddc8a6) 00:40:50 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:50 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:40:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = creat(&(0x7f0000000840)='./file0\x00', 0x1a4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001040)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@local}}, &(0x7f0000001140)=0xe8) stat(&(0x7f0000001180)='./file0\x00', &(0x7f00000011c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001240)={{{@in=@multicast2, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in6=@remote}}, &(0x7f0000001340)=0xe8) lstat(&(0x7f0000001380)='./file0\x00', &(0x7f00000013c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = geteuid() getgroups(0x2, &(0x7f0000001440)=[0xffffffffffffffff, 0xffffffffffffffff]) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001480)={0x0, 0x0}, &(0x7f00000014c0)=0xc) stat(&(0x7f0000001500)='./file0\x00', &(0x7f0000001540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f00000015c0)={0x0, 0x0}, &(0x7f0000001600)=0xc) lstat(&(0x7f0000001640)='./file0\x00', &(0x7f0000001680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000001900)={{{@in=@remote, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000001a00)=0xe8) lstat(&(0x7f0000001a40)='./file0\x00', &(0x7f0000001a80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r14 = eventfd2(0x10000, 0x1) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffffff, 0xc00c642d, &(0x7f0000001b00)={0x0, 0x80000, 0xffffffffffffffff}) r16 = epoll_create1(0x80000) r17 = socket$inet6_tcp(0xa, 0x1, 0x0) r18 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001b40), &(0x7f0000001bc0)=0x60) r19 = syz_open_dev$radio(&(0x7f0000001c00)='/dev/radio#\x00', 0x1, 0x2) r20 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001c40)='/proc/self/attr/current\x00', 0x2, 0x0) r21 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001c80)='/dev/nullb0\x00', 0x40, 0x0) ioctl$VIDIOC_QBUF(0xffffffffffffff9c, 0xc058560f, &(0x7f0000001cc0)={0x5, 0xe, 0x4, 0x0, {0x77359400}, {0x3, 0x8, 0x4, 0x1f, 0x3, 0x2, "5e4eb90c"}, 0x80, 0x1, @fd=0xffffffffffffff9c, 0x4}) r23 = socket$nl_route(0x10, 0x3, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001d40)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000001e40)=0xe8) r25 = getegid() r26 = openat$vimc1(0xffffffffffffff9c, &(0x7f0000001e80)='/dev/video1\x00', 0x2, 0x0) r27 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000001ec0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000002480)={{{@in6=@loopback, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@mcast1}}, &(0x7f0000002580)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000025c0)={0x0, 0x0, 0x0}, &(0x7f0000002600)=0xc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002640)={0x0, 0x0}, &(0x7f0000002680)=0xc) lstat(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r32 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) r33 = openat$dir(0xffffffffffffff9c, &(0x7f0000002780)='./file0\x00', 0x10181, 0x28) r34 = socket$inet_udplite(0x2, 0x2, 0x88) r35 = accept4$llc(0xffffffffffffffff, &(0x7f00000027c0)={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @random}, &(0x7f0000002800)=0x10, 0x80800) r36 = accept$alg(0xffffffffffffff9c, 0x0, 0x0) r37 = openat$audio(0xffffffffffffff9c, &(0x7f0000002840)='/dev/audio\x00', 0x20000, 0x0) r38 = openat$dir(0xffffffffffffff9c, &(0x7f0000002880)='./file0\x00', 0x40, 0x2) r39 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000028c0), 0x4) pipe2(&(0x7f0000002900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r41 = socket$inet_sctp(0x2, 0x5, 0x84) r42 = socket(0x2, 0x80007, 0x247) r43 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002940)='/dev/fuse\x00', 0x2, 0x0) r44 = socket$nl_generic(0x10, 0x3, 0x10) r45 = socket$bt_cmtp(0x1f, 0x3, 0x5) r46 = timerfd_create(0x5, 0x80800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002980)={0xffffffffffffffff}) r48 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000029c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r49 = syz_open_procfs(r0, &(0x7f0000002a00)='environ\x00') r50 = openat$md(0xffffffffffffff9c, &(0x7f0000002a40)='/dev/md0\x00', 0x40, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000002e40)={{{@in6=@mcast1, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f0000002f40)=0xe8) fstat(0xffffffffffffffff, &(0x7f0000002f80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r53 = socket$inet6_udplite(0xa, 0x2, 0x88) r54 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000003000)='/dev/cachefiles\x00', 0x4a0100, 0x0) r55 = syz_open_dev$vcsa(&(0x7f0000003040)='/dev/vcsa#\x00', 0x10001, 0x2000) r56 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000003080)={0x28, 0x0, 0x0, @my=0x0}, 0x10, 0x80800) r57 = openat$smack_thread_current(0xffffffffffffff9c, &(0x7f00000030c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r58 = socket$nl_netfilter(0x10, 0x3, 0xc) r59 = accept$packet(0xffffffffffffffff, &(0x7f0000003100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000003140)=0x14) r60 = eventfd(0x1ff) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003500)={0x0, 0x0}, &(0x7f0000003540)=0xc) fstat(0xffffffffffffff9c, &(0x7f0000003580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet_IP_XFRM_POLICY(r40, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@ipv4={[], [], @loopback}}}, &(0x7f0000003700)=0x9be2cb1569301a3c) getgroups(0x4, &(0x7f0000003740)=[0xee00, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]) r65 = syz_open_dev$radio(&(0x7f0000003780)='/dev/radio#\x00', 0x2, 0x2) r66 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000037c0)=0xffffffffffffffff, 0x4) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000003800)={0x0, 0x0}, &(0x7f0000003840)=0xc) lstat(&(0x7f0000003880)='./file0\x00', &(0x7f00000038c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getresuid(&(0x7f0000003cc0)=0x0, &(0x7f0000003d00), &(0x7f0000003d40)) r70 = getegid() r71 = geteuid() r72 = getegid() stat(&(0x7f0000003d80)='./file0\x00', &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000003e40)='./file0\x00', &(0x7f0000003e80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmmsg$unix(r1, &(0x7f0000004900)=[{&(0x7f0000000880)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000000a40)=[{&(0x7f0000000900)="a8b1f65e81e22e4ad1cd7a1a193ed9c0328904cf2b254d5702e9c93060979f35cd68885ab329aff138d9244b6fa6466165ab536b277834057385fbb4768c501e9c6700aad0ee03ffc174a3e3dbaf0955d4428829c76cf9926c48ce5ea4e8ed77e1a19f644e7a477eae580a7650fbc12f52a0dc832eada80e20bf1f1605e237558483a56b53d1d15e17645f48ca3fa34073fcc9bc363a62287677bf89fe7f8954d89c9e074389236b3d7605e55a15", 0xae}, {&(0x7f00000009c0)="99826be5edf83efa9d830a62ee716b35bdd45952dc79bdf7389f64ab7e062428aa25283e830d1bfdb7fb2d5a7daa7a100ed1a7a059eb6c868a4ab30a6aabe9c6a977122c93b62da87cd83721ed8b5241efb3b2f94b1a48", 0x57}], 0x2, 0x0, 0x0, 0x20008084}, {&(0x7f0000000a80)=@file={0x1}, 0x6e, &(0x7f0000000fc0)=[{&(0x7f0000000b00)="f76b5e695f6e697e6cbf71341a53a38e28a9584804d7b15e8bf10fa3cb6a4b75d1896ecf0e83217885ace16411be5220462660879d3fb06d67a503814f068ad0e6884555a6fee833af903fc927af2a9a6f7e200e8955c87c1cf7599cfcb56be1e833eb46bc509d8eeb182ba312b17254809003f5ef84b8d2a268f0", 0x7b}, {&(0x7f0000000b80)="7f2e5b43ee11cfb499e68fcccda47e3c9495370b6ca80a568db61fd383829dc79baf33ef9f87a744a0df0bf34a1af1b3c6156a55fcf44e0793c7d85c52f0a16908df76ed916a92b96715c500f699f5dc94ec4da9b1a1d973104893e26803c74d81435d4b2d2865da4b8c37af5f54ccc3e414c7b70c405a031f9340414b8cb087d0c879603967a90345b760419d418a215f", 0x91}, {&(0x7f0000000c40)="42c97d73de1489867d1b35300dd11854d8a0e65c7bf249a2225fa63e82e59efe83f90ec1a2e704bfa99c12b96f497ec7098fd16e0d2a8781e3dd41828f8fa011ad93ada8e8b2630f28dffff518b2f422a8d000c22eecc88c9d9ffe6260bf4c10ab1f4c30d5984362a47bc1af1873fe507f07f5b1f85bb67e18f91d46d3085722afe7a43cfd674534b5ba1b60dd33fa8585b326b9ae982c70", 0x98}, {&(0x7f0000000d00)="f0677833619c4795c803c0f510d6827076376b81be26cd52656cf30fa39bf6301466d29bad27f4930831269fc4807feece7933f49032d40d16e9152deef7214c1ee703af433926675f77cf969a9ed0bf0181b96e199386fe513bbff8ecc051b1d931f5f1b8e44782a7bb40e5bbbe47bb9a2f311332f22d3503fe29c793f02904fcda85e444e78ece8fd8542a6b8fadb1e82e359798499e4205385a2b14eb6b070a844af9397c5b933f4adfb342e218b986", 0xb1}, {&(0x7f0000000dc0)="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", 0xfb}, {&(0x7f0000000ec0)="feaa33a0265ed8f6ab2151836d3919f2901f3dc7f780e02ab0daeff079733f739b9534ed510923a46b5c0036d7a68c2f7630ccb4ee7b4555ae1aefc1d86faa5d4e26a3eea98b54d0a6e2e49741ea8e37b7cb3e3125fece3fd3bc2163fdd282f8ef6f5aeb95d237dbfe572c250b2d5bdc1e61573ef48a6ccb9a517c9c76984c56c9077a8ca9c74b66ee8d74f889535bb99be3c5716333a69434f6a92684609ab55d35c41460f7d932f979b7f622865060017d8f9660a86ec9359499632406bbf199aa34376046f98527b8b7410e77218b54550a", 0xd3}], 0x6, &(0x7f0000001700)=[@cred={0x20, 0x1, 0x2, r0, r2, r3}, @cred={0x20, 0x1, 0x2, r0, r4, r5}, @cred={0x20, 0x1, 0x2, r0, r6, r7}, @cred={0x20, 0x1, 0x2, r0, r8, r9}, @cred={0x20, 0x1, 0x2, r0, r10, r11}], 0xa0}, {&(0x7f00000017c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e, &(0x7f00000018c0)=[{&(0x7f0000001840)="96a056c3543cda079347f3f1b9d588953056048d25d84111e16133c710c01732d78a68acf128df97d44fe6ac66a88cddf8326a154a395b1b57f0a3538db9f48691c95be76878cad41d4f2da4c17f8782f04058a10c1f25e92d93ff5da15648829708d173", 0x64}], 0x1, &(0x7f0000001f00)=[@cred={0x20, 0x1, 0x2, r0, r12, r13}, @rights={0x38, 0x1, 0x1, [r14, r15, r16, r17, r18, r19, r20, r21, r22, r23]}, @cred={0x20, 0x1, 0x2, r0, r24, r25}, @rights={0x18, 0x1, 0x1, [r26, r27]}], 0x90, 0x800}, {&(0x7f0000001fc0)=@abs={0x0, 0x0, 0x4e22}, 0x6e, &(0x7f0000002400)=[{&(0x7f0000002040)="d5d16d955620ae17247756c6674f7736c678", 0x12}, {&(0x7f0000002080)="ef3121b27c448487f0a8419daea80dfc2014208a2da5f70dd3a69411a621f945f5843a9af70e88920d7da8b1ee35abf31d5134a6978120bbbf9083af1fe7e01b1300175b140af6316479c0969dc0911972bf59ef06a401a0a122770ebdad9e20b416a511cd28d82e96be13eb791e9497c1b5156f6e7ca92d054c987873bbe9356eab3aa0b4c03b47db7a384b1e5718c9ba8ef0259a6cd2d64de50df330bb353967f41f107e4d89385d832340c638", 0xae}, {&(0x7f0000002140)="4bd496753f3f76949870f85ca57553479095b09d9cd625d59ebb3e48e11e1113b392afd7178831caf8a69a47e4018483d5e9b4d9424f43743e7ba7626f5ac751ca49839050c25afe7f57f8813716223418e08139c28f2282a768", 0x5a}, {&(0x7f00000021c0)="5cdf3580fb7d", 0x6}, {&(0x7f0000002200)="4e5c0df86f417027947f1154782c39c41df60139946f487742c88d8c0b0de42ce7dd97e827bad05dcfb7e610ef89385f35bedf74f1a425af8edc2ac7feaad7e63e7c28f56f2ae2eb82b3ac8cfd6a83e2478c440063736a40fe54931b1aef2bfef5904e2721deb5fad85445c1423b1fc48332825b2314cc72a6ca2c3bc988d88bd225e8bc805b3478f44c4b0aa6ab2fd620a17bba09e7ae15cc828672dcda2cb971566adbb06e01300788a7ec8c8914ca6840f1f2507bb27ae1857dfa4f", 0xbd}, {&(0x7f00000022c0)="5463a2b221134683b78bea89", 0xc}, {&(0x7f0000002300)="a0b25edbb093f8959e0de3bf916e2f9734db7301653388446fdcb8f34b323a63e5d8e321a877850f8256f0fb9f4aa21a", 0x30}, {&(0x7f0000002340)="9ccc984f2ab579d18e94bdc8f0a722ae0262239a3e5ecc272f5d72ef2e9c21376a9c982f1e676b01e371eba5884cd8eef06db9954f277d7ecf0a8845509fafadf4a5ed948fd39fc0fedd43422f5ed6e7bec5a31737de0b97d337b9a26290b6ed2056a7856caf36828e2e132878bd0c723800155789a9182a89ec58c45cdb8413b6317b0af5e885a7e28850d47e0af04be57e5a41ec4eebb3a53b104badd077431989", 0xa2}], 0x8, &(0x7f0000002a80)=[@cred={0x20, 0x1, 0x2, r0, r28, r29}, @cred={0x20, 0x1, 0x2, r0, r30, r31}, @rights={0x18, 0x1, 0x1, [r32]}, @rights={0x18, 0x1, 0x1, [r33, r34]}, @rights={0x20, 0x1, 0x1, [r35, r36, r37]}, @rights={0x38, 0x1, 0x1, [r38, r39, r40, r41, r42, r43, r44, r45, r46, r47]}, @rights={0x20, 0x1, 0x1, [r48, r49, r50]}], 0xe8}, {&(0x7f0000002b80)=@file={0x0, './file0\x00'}, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002c00)="c9dbed377fe1527aceb675", 0xb}, {&(0x7f0000002c40)="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", 0xfc}, {&(0x7f0000002d40)="6ce3beb4e2057624d8a5ae5652ca2c848c06741b03b2959e185d25918b81254fe45d3553dcd301c5626d692360d8c2f3ca2c3b5e2edc7924b4e45e96c5598f538f16b3c58ef252886f2246190c99f3d6caaffa9e8068a86690e6372adc9c3eaf1bf81a6b3c6c42c3d91d54a3649bed1bad37c40eacacaa72423bcc9f7b797c54f051c66f428f2b3543ee1c409bb11a8704d969613ce9e902738f6d9eb667", 0x9e}], 0x3, &(0x7f0000003180)=[@cred={0x20, 0x1, 0x2, r0, r51, r52}, @rights={0x30, 0x1, 0x1, [r53, r54, r55, r56, r57, r58, r59, r60]}], 0x50, 0x40}, {&(0x7f0000003200)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f00000034c0)=[{&(0x7f0000003280)="3ff0ac23c0828cdbbbab1fe8078163b01b889bdf8fb2c67233dbea", 0x1b}, {&(0x7f00000032c0)="5eaaef55fd2d06519631310c17826d69ad265bf820e93ac6c7bd65802c06e94ccdee62d23d9cbf603920891d7eb1f7c577b4c4051deefb23b4a344481a2aff5a0716be1cbb70454a84cbc0d683833b4179b1f4889427b0eb234cb0b7bbc4990c8e0a6af130b00fb0f7df828581fc95eab3ad509b973ed668bb2078629d59e76efb8551e3fe78a3e0beffe075aaa363", 0x8f}, {&(0x7f0000003380)="0379b2119816162e78826ca9460cffbb863a2a6cb79e07d0515fc67a333e9df2c718bc3169c96426128a8c4ceead4fc48b78625ecaf146e903af5f9b9e7f7fbec812c0a11b3ca342d29933c6a986", 0x4e}, {&(0x7f0000003400)="e7d83dc1ab2b430de8731b8040fe3006425a3e51c63418ec27aa48f823a5011cfe474fc29529ea4ad98a4043c7bce336f6c91831b8e6354a8f31a90eef8ffd0bb82e73c50ec88c1fd3ea5066c10ec0b88e0e9ccb9cd95dd56e7b15765055cb44dab8e27cee763c12678f3437984edde06e175af1adf2ea5ca70ead5fd78029cdeca3ff641c2ee726cd0c5f2835f9aab7a2b53e5dbb5a6922be5221770f67089ea16206806593f1", 0xa7}], 0x4, &(0x7f0000003940)=[@cred={0x20, 0x1, 0x2, r0, r61, r62}, @cred={0x20, 0x1, 0x2, r0, r63, r64}, @rights={0x18, 0x1, 0x1, [r65, r66]}, @cred={0x20, 0x1, 0x2, r0, r67, r68}], 0x78, 0x20000001}, {&(0x7f00000039c0)=@abs={0x0, 0x0, 0x4e20}, 0x6e, &(0x7f0000003b40)=[{&(0x7f0000003a40)="e8090cac9a285a6e966065a2d51984b4a4cb30f91a913d63b8c1f8e5d95c068aa713c0b2b209f52d41d3c939226cf8166f49d184dd4eb165b2ce1e57779508f5568397d9017053dfba48954360aa18fc588cc395423e32dd9b1dac88df24f774297b170dfedb21edd6ddc62bd9936853d3f6abf6235b7cf43e749f96dce486a06f49e6efc32b0dbc905d293508d73a7e927e38fcaf489f469b91aa39598a98f5f31e8ad37cb5361c55b4c2a57b6ca50a8bb103798ff84cdc42aee4b94424ff04606fb5cfc9f93bddcc5eeffd273d88fba318a2d8f992a8c208bebf8592083de1b4a6e50218d8543a42d9ab35c5b464b355041f08d9", 0xf5}], 0x1, 0x0, 0x0, 0xd1}, {&(0x7f0000003b80)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000003c80)=[{&(0x7f0000003c00)="ab8cd9c8e44f424ab0b8e2a4fe04d4fd9c28acf63951509a1c345af0ce6a037ff47d2f546c32ef89cfb4e4900ca30394526f63bcb23e4fa73cda1d6e9a2e7cddbe2daa83a23d9b537f797934fcf6cdd693", 0x51}], 0x1, &(0x7f0000003f00)=[@cred={0x20, 0x1, 0x2, r0, r69, r70}, @cred={0x20, 0x1, 0x2, r0, r71, r72}, @cred={0x20, 0x1, 0x2, r0, r73, r74}], 0x60}, {&(0x7f0000003f80)=@abs={0x1, 0x0, 0x4e21}, 0x6e, &(0x7f0000004500)=[{&(0x7f0000004000)="1bb9d0f18da239b169b3e6fd23469a011b9f6a3e2266e35225d87e1dd7689a9ee44dc382ee8ba506d898b12c5b84bdf522bd4b89470579202a0e71a7afa0055812c4086723137b7cab4089ad638622a9c5ceafc5386a5387098fe3e305569ed14b55b302d1c5393ba01e4bf82135b6bb9c94f47973c3ea0c7c3e0c1f8b4013e593246a397e6f58b44d596ea5eb9afb8452221a1e42f428e867fa0dd100bcc5d280eb4572d24f59a5bc4afc4265358c05fa941eb3d7b25e276d6e956d11b6dcedbdefb3b0f0c4b45a3ddeea1eafff37d5242ad50efab010d69c", 0xd9}, {&(0x7f0000004100)="0868419c58af62880dfba7a9854dbe9cab0de6bf0e344fab498a189755765f5ac40c6d52d54d161fc11b2a5b22b960f4e51e3678b6e2e5aa85f5f50da715a909599f3bd976ba354622a807529c0bc74148e4252bfc0e82cc5a280a388511946074fbca5987ccf7a514dffa6c3eb4e2ed5ce5bc5b0dd56984d3c81d062dafb918a6af636457a988f3ea386eb4f6bf5eaddc41346b2f", 0x95}, {&(0x7f00000041c0)="3f59c1dc5343f6458bcaf8bf795c1a8782b0a59fb2624024f8e07a55be3e5a2fede223adb96c624736f42c08cf76e1010eef329cafa2601de24a82d97ebe97ad62dcbb9b7c73a76d6807f25a664b3fab8ca096ae6ab81e4d50b5b4e1c1bb8bdb5ce6fe06aad7fb1e78a0cda2d8a41f523e4f1d42c5254472799975e5a0ed02d1eccaaee5f82c8a99ba1aa8153bebf27d56cd2c5532a8f6d8d3f9096320ace0d348744547928d5f6afe786e9814a3719ea4ec4899485fd060e6432acce3873329f875abbd38374782494dabc43747adf4e799f1bc019c976eef2bb2", 0xdb}, {&(0x7f00000042c0)="691c5b45859dbf34bede36ffbed815ddc6f6260d7987ba14acdd5f41b17e04c2e7aa59cd8a948c75dc361577df18b9f2bd4167e5609974056f51c949bf1a7dc5e6618cfbd1cfae2409f0c5fe388d19c7a67d43695ecfee431ac5ce599df1d77e3b1a6b62763b2b93856674801bcd2e31c068739b185bbac86cc9a31fc38fee5ac5b36e76ac13ec77d8a98e639b48062cf4094bb49b4b60187ce6b9732520c4f3c261476638843dd3f7442f3f6bf6d0e55fd421456f6b30f56ff0cf461fa2a95a9eca2fb5f59a", 0xc6}, {&(0x7f00000043c0)="078fb0e6c753d35cd198fdce82257dab0f6a354e93c2", 0x16}, {&(0x7f0000004400)="4fb4c2e40e06f5d9c927e0827c451040259f1e300bf7d3f3902f0db9f987f3f77e0030473361f65c7b5d7e87b8fde52a3885a1a8562029a4fc6d7775bbfa884bec1b1b219d641d057d9b1b283939080a53602026a054b7241a3ba2dc263bbf1869711de5aa0865e44c94a246", 0x6c}, {&(0x7f0000004480)="fa4186680f84901166d581594662834b7945616f8c7ea85cc17431bef59a5f712652da166dfa8a4061a7a8ec4b08810d00c234776c9eb00ef8939cde3deb08e1486314165f752d9cd08a09b95a87605ce2ec6e6254b8c260b3dbe57bf496a6f4d0507a02e8269df0d98eb2", 0x6b}], 0x7, 0x0, 0x0, 0x20008000}, {&(0x7f0000004580)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000004880)=[{&(0x7f0000004600)="6bc6636052e21566bd4492a882deaeb9b896037959209b24b037d82637e13cefbc6cf6880952796e723e0c", 0x2b}, {&(0x7f0000004640)="17fc0bd384175d96918d0d384449a5eb054ac5ab5563f0293aca5684c09e3499d02e9e7dcd3436b68a271d6b058c192c992c3835b463816dc50449a768ffb06c630080fe1e585ee7d70072c5ffda23d430a7b15b2e1f824277550fffff890d4f91c640c7242844436e486594596e23287a7187bfe82aa02b85bb0325afc2", 0x7e}, {&(0x7f00000046c0)="cbf3dd6fa3e2d6c056", 0x9}, {&(0x7f0000004700)="a53ec6c274e522ceec710d02d74152b65c03d16a6e4434e3c4837e1d61cec396d3212ddd9f4b4a3d5098d3872e0c79d65373d2c06032c7b52e7bac03655aaa7f471c74d0075dca379bb44ca106f6bc508fe0b49c75a218d94fd72b8ca4ca598c98d577e8fa6e53e26391d6075597d5589c1afa438456f4f1335c0197a9adde35dd65cf5338417a3fb40ccc8760d42ddbeea344b635ffbb45192b0630ca7b3d4b1471906a692c6dfff3b1e1c6f55d6bfec876ca99e8e1fb19c36a76478f2b2929", 0xc0}, {&(0x7f00000047c0)="ad88a09e2f2a4f31db672f7f7ff96217ccafa7e1a36180799ff2b28e87b886f27ac94ce16f7a486ee76bb6dd0a1469ac74678da2e0868fbe3102571e4de9fcc08d5d2c14040ff899fbdb917b63e7e1fdde2ce6020879f4d6f14f6ce3999dd16eccabf5ac44685495e4f3e22709f8566da72300bbd7bcf8f495fb5fca6e70b2e4f8133b4934b0b9bb0dab0d46f588c82975923cd536d64bc24435a3d5f93b98c2fc0089b8774f7c73fb16ad84b314f93159d468d0a89a26f189e23a13caee420f", 0xc0}], 0x5, 0x0, 0x0, 0x10}], 0xa, 0x20000001) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) tkill(r0, 0x21) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xcc9cc0d) 00:40:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r2}) 00:40:51 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) [ 905.215249][ T26] audit: type=1804 audit(1552264851.184:47): pid=15583 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir259372811/syzkaller.YCoBwm/652/file0" dev="sda1" ino=17066 res=1 00:40:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1b613bf5) 00:40:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xce67379) [ 905.299471][ T26] audit: type=1804 audit(1552264851.264:48): pid=15659 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=ToMToU comm="syz-executor.2" name="/root/syzkaller-testdir259372811/syzkaller.YCoBwm/652/file0" dev="sda1" ino=17066 res=1 00:40:51 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) getsockopt$bt_BT_SECURITY(r1, 0x112, 0x4, &(0x7f0000000040), 0x2) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x0, 0x0) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000140)={[], 0x8000, 0x0, 0x0, 0x20000006, 0x9c, r0}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) [ 905.408649][ T26] audit: type=1804 audit(1552264851.304:49): pid=15583 uid=0 auid=4294967295 ses=4294967295 subj=_ op=invalid_pcr cause=open_writers comm="syz-executor.2" name="/root/syzkaller-testdir259372811/syzkaller.YCoBwm/652/file0" dev="sda1" ino=17066 res=1 00:40:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdccc90c) 00:40:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1de1ba20) 00:40:51 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r1 = eventfd(0x10000062) ioctl$KVM_IRQFD(0xffffffffffffffff, 0x4020ae76, &(0x7f0000000000)={r1}) 00:40:51 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) 00:40:51 executing program 2: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x101000, 0x0) r1 = fcntl$getown(r0, 0x9) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000140)={[], 0x2, 0xffffffff, 0x101, 0x5, 0x8, r1}) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) r3 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r2, 0x4) ioctl$VIDIOC_S_PARM(r3, 0xc0cc5616, &(0x7f00000001c0)={0x5, @output={0x1000, 0x1, {0x0, 0xffff}, 0x0, 0x401}}) ptrace$cont(0x18, r2, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r2, 0x0, 0x0) 00:40:51 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdece892) 00:40:51 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1e6de4b7) 00:40:52 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:40:52 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) getpeername$ax25(r1, &(0x7f0000000040)={{0x3, @netrom}, [@bcast, @remote, @null, @default, @null, @bcast, @remote, @netrom]}, &(0x7f0000000140)=0x48) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 00:40:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xdf9176d) 00:40:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) 00:40:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2035134f) 00:40:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xe2fb799) 00:40:52 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, 0x0) 00:40:52 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/zero\x00', 0x400000, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000240)='TIPC\x00') sendmsg$TIPC_CMD_GET_MAX_PORTS(r1, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x1c, r2, 0x10, 0x70bd27, 0x25dfdbfc, {}, ["", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x800) wait4(0x0, 0x0, 0x80000000, 0x0) r3 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000180)='/dev/dsp\x00', 0x80, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000014c0)={{{@in6=@mcast2, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@remote}}, &(0x7f00000015c0)=0xe8) connect$packet(r3, &(0x7f0000001600)={0x11, 0x19, r4, 0x1, 0x62b7, 0x6, @dev={[], 0x17}}, 0x14) ptrace$setopts(0x4206, r0, 0x0, 0x0) r5 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_ENTRY(r5, 0x4010ae74, &(0x7f0000000080)={0x80000001, 0x5, 0x5}) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000040)) syz_init_net_socket$ax25(0x3, 0x3, 0xcf) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000440)=ANY=[@ANYBLOB="e0773403a96685aa4790644113d180bf7bc664d60ed3a73dc4052309deae63197035ad9c557b73a8c9b1252e67bf9f92bcfbaf9fec9eaf83891e7cb969bafedcb1157314bbfa813569265ddd2cffd3e95960ec5a09fabbab209aba6631fdc86208c9463a16d8bc98c3693913b207a993cb189079c096e0c07d6b9f20138d6df627020b2e92a92f3f922bda1a54bdf4b2264e6c06c07bbd44866118359e52bbd63eb6456f1f011a1c48b6be005d4650d551", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], &(0x7f0000000140)=0x2c) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) sendmsg$TIPC_CMD_GET_NETID(r1, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)={0x1c, r2, 0x200, 0x70bd2c, 0x25dfdbfb, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4801) 00:40:52 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 00:40:52 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2082a8b5) 00:40:52 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x10000000) 00:40:53 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:40:53 executing program 2: clone(0x80000, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000080)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x804082}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=@bridge_setlink={0x28, 0x13, 0x20, 0x70bd2b, 0x25dfdbfb, {0x7, 0x0, 0x0, r2, 0x1880, 0x10}, [@IFLA_TXQLEN={0x8, 0xd, 0x70f7}]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x4000004) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x40000020000023, r0, 0x0, 0xffffffffffbfffff) 00:40:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)) 00:40:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, 0x0) 00:40:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1013a454) 00:40:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x20b2cf53) 00:40:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x11271bd4) 00:40:53 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)) 00:40:53 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r1, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x94c}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x1b, &(0x7f0000000140)=ANY=[@ANYRES32=r2, @ANYBLOB="7f00000009dbd570e6aa15b203eb760cfd9fade737fd6a382b52d00939019c2aea84ea13dd17be6ebefa9f202f6b0e224b9a808968c396ca604c9122d304d2e0fa15c40423a84487e9f2b88de69f2bbaa56219ec523a8777d8f5f0aea5fb0f18586f10c81a4a43332be219308c1acb3b2cdcf6809d0d6aa59e944eaaa922eb183ea556"], &(0x7f0000000200)=0x87) gettid() tkill(r0, 0x74) ioctl$SNDRV_RAWMIDI_IOCTL_PARAMS(r1, 0xc0305710, &(0x7f0000000240)={0x1, 0x1, 0x9, 0x10001}) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:53 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) 00:40:53 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x20bae11d) 00:40:53 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x13664982) 00:40:54 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_destroy(r0) 00:40:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) 00:40:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x15e53835) 00:40:54 executing program 5: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)) 00:40:54 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x23020000) 00:40:54 executing program 5: 00:40:54 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x197e03db) 00:40:54 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)) 00:40:56 executing program 2: clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(r0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) r1 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/am_dr\x8c\x9aoprate\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r0, 0x4) ptrace$cont(0x18, r0, 0x0, 0x0) ioctl$UDMABUF_CREATE(r1, 0x40187542, &(0x7f0000000000)={r1, 0x1, 0x1000, 0x1000}) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r0, 0x0, 0x0) 00:40:56 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_destroy(r0) 00:40:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2343a6d7) 00:40:56 executing program 5: 00:40:56 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x199881c3) 00:40:56 executing program 3: 00:40:56 executing program 3: 00:40:56 executing program 2: 00:40:56 executing program 5: 00:40:56 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x19ddc8a6) 00:40:56 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x236739c1) 00:40:56 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_destroy(r0) 00:40:56 executing program 3: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) getsockname$netlink(r0, 0x0, &(0x7f0000000040)) 00:40:56 executing program 5: r0 = openat$urandom(0xffffffffffffff9c, &(0x7f0000000000)='/dev/urandom\x00', 0x0, 0x0) readlink(0x0, 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x5452, &(0x7f0000000140)) 00:40:56 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) eventfd(0x0) 00:40:56 executing program 2: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x82003, 0x0) write$P9_RWALK(0xffffffffffffffff, 0x0, 0x161) r1 = gettid() write$P9_RFSYNC(0xffffffffffffffff, 0x0, 0xd9392cac9185aeab) timer_create(0x7, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) timer_create(0x0, &(0x7f0000044000)={0x0, 0x12}, &(0x7f0000044000)) write$P9_RLINK(0xffffffffffffffff, 0x0, 0x313) timer_settime(0x0, 0x0, &(0x7f0000000100)={{0x0, 0x989680}, {0x0, 0x1c9c380}}, 0x0) write$cgroup_subtree(r0, 0x0, 0x0) writev(0xffffffffffffffff, 0x0, 0x247) ioctl$TIOCLINUX5(0xffffffffffffffff, 0x541c, 0x0) tkill(r1, 0x1000000000016) 00:40:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1b613bf5) 00:40:57 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$ARPT_SO_GET_ENTRIES(r0, 0x0, 0x61, &(0x7f00000000c0)={'filter\x00', 0x4, "b054ffe6"}, 0x0) 00:40:57 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:40:57 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_destroy(r0) 00:40:57 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x26ef575b) 00:40:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1de1ba20) 00:40:57 executing program 3: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:40:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x1e6de4b7) 00:40:57 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_destroy(r0) 00:40:57 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:40:57 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2035134f) 00:41:00 executing program 2: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2035134f) 00:41:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x29bfd5a4) 00:41:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2082a8b5) 00:41:00 executing program 3: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:41:00 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:41:00 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_destroy(r0) 00:41:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x20b2cf53) 00:41:00 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) 00:41:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x20bae11d) 00:41:00 executing program 4: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(0x0) 00:41:00 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = eventfd(0x10000062) ioctl$KVM_IRQFD(r2, 0x4020ae76, &(0x7f0000000000)={r3}) 00:41:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2a867a79) 00:41:00 executing program 3: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) 00:41:00 executing program 4: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(0x0) 00:41:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x23020000) 00:41:00 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000180)={r8, 0x4}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r6, 0xc0305616, &(0x7f0000000580)={0x0, {0x0, 0x3}}) socket$inet_udp(0x2, 0x2, 0x0) 00:41:00 executing program 4: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(0x0) 00:41:00 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2343a6d7) 00:41:00 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2b2be475) [ 914.624360][T17553] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:01 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) 00:41:01 executing program 4: io_setup(0x0, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x236739c1) 00:41:01 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000180)={r8, 0x4}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r6, 0xc0305616, &(0x7f0000000580)={0x0, {0x0, 0x3}}) socket$inet_udp(0x2, 0x2, 0x0) 00:41:01 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2becb0cb) 00:41:01 executing program 4: io_setup(0x0, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 915.348602][T17820] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:01 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:01 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x26ef575b) 00:41:01 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000180)={r8, 0x4}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r6, 0xc0305616, &(0x7f0000000580)={0x0, {0x0, 0x3}}) socket$inet_udp(0x2, 0x2, 0x0) 00:41:01 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x30d5ee91) 00:41:01 executing program 4: io_setup(0x0, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 915.616896][T17942] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:02 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) 00:41:02 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:02 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x29bfd5a4) 00:41:02 executing program 4: io_setup(0x80000000000003, 0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(0x0) 00:41:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x31fb4448) 00:41:02 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000180)={r8, 0x4}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') ioctl$VIDIOC_SUBDEV_S_FRAME_INTERVAL(r6, 0xc0305616, &(0x7f0000000580)={0x0, {0x0, 0x3}}) 00:41:02 executing program 4: io_setup(0x80000000000003, 0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(0x0) [ 916.314125][T18059] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:02 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:02 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2a867a79) 00:41:02 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000180)={r8, 0x4}, &(0x7f00000001c0)=0x8) syz_genetlink_get_family_id$net_dm(&(0x7f0000000540)='NET_DM\x00') 00:41:02 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:02 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x351bf4ba) [ 916.590941][T18184] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:03 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:03 executing program 4: io_setup(0x80000000000003, 0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_destroy(0x0) 00:41:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2b2be475) 00:41:03 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:03 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r6, 0x84, 0x13, &(0x7f0000000180)={r8, 0x4}, &(0x7f00000001c0)=0x8) 00:41:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3538e515) 00:41:03 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:03 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) [ 917.303259][T18300] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2becb0cb) 00:41:03 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000100)={0x0, 0x1d029d6b}, &(0x7f0000000140)=0x8) 00:41:03 executing program 5: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x362e48aa) 00:41:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x30d5ee91) 00:41:03 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:03 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 917.541023][T18424] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:03 executing program 5: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:03 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000, 0x0}, &(0x7f0000000440)=0x20) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r7, @in={{0x2, 0x4e21, @empty}}}, 0x84) 00:41:03 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x36f420a0) 00:41:03 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:03 executing program 5: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x31fb4448) 00:41:03 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 917.828299][T18546] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:03 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:03 executing program 5: io_setup(0x0, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:03 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x351bf4ba) 00:41:04 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) r6 = syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000400)={0xffffffff, 0x375, 0x2, 0x9, 0xe71, 0x7, 0x3, 0x100000000}, &(0x7f0000000440)=0x20) 00:41:04 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3b7cd1a1) 00:41:04 executing program 5: io_setup(0x0, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3538e515) [ 918.142617][T18689] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:04 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:04 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:04 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) syz_open_dev$radio(&(0x7f00000000c0)='/dev/radio#\x00', 0x3, 0x2) 00:41:04 executing program 5: io_setup(0x0, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x362e48aa) 00:41:04 executing program 3: r0 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x10fc0f7e, 0x80000) ioctl$CAPI_GET_PROFILE(r0, 0xc0404309, &(0x7f0000000080)=0x10001) clone(0x802102001ffe, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/expire_nodest_conn\x00', 0x2, 0x0) read$alg(0xffffffffffffffff, 0x0, 0x0) pipe(0x0) tkill(r1, 0x4) ptrace$cont(0x18, r1, 0x0, 0x0) ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f00000000c0)={[], 0x0, 0x0, 0x0, 0x20000004, 0x9c}) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x20, r1, 0x0, 0x0) 00:41:04 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3bb28dce) [ 918.471484][T18905] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:04 executing program 5: io_setup(0x80000000000003, 0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x36f420a0) 00:41:04 executing program 2: r0 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r2, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r3, &(0x7f0000000240)='./file0\x00', r4, r5, 0x1400) ioctl(r2, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") ioctl$CAPI_MANUFACTURER_CMD(r0, 0xc0104320, &(0x7f0000000000)={0xa, 0x0}) 00:41:04 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x2302) 00:41:04 executing program 5: io_setup(0x80000000000003, 0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:04 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:04 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3f5ed5ca) 00:41:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3b7cd1a1) 00:41:04 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r2, &(0x7f0000000240)='./file0\x00', r3, r4, 0x1400) ioctl(r1, 0x1000008912, &(0x7f0000000040)="0adc1f123c123f3188b070") 00:41:04 executing program 5: io_setup(0x80000000000003, 0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:04 executing program 3 (fault-call:3 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:41:04 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:04 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:04 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3bb28dce) 00:41:05 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) r2 = syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) fchownat(r2, &(0x7f0000000240)='./file0\x00', r3, r4, 0x1400) [ 919.051082][T19137] FAULT_INJECTION: forcing a failure. [ 919.051082][T19137] name failslab, interval 1, probability 0, space 0, times 0 [ 919.085772][T19137] CPU: 1 PID: 19137 Comm: syz-executor.3 Not tainted 5.0.0+ #16 [ 919.093436][T19137] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 919.103485][T19137] Call Trace: [ 919.106786][T19137] dump_stack+0x172/0x1f0 [ 919.111129][T19137] should_fail.cold+0xa/0x15 [ 919.115730][T19137] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 919.121551][T19137] ? ___might_sleep+0x163/0x280 [ 919.126430][T19137] __should_failslab+0x121/0x190 [ 919.131391][T19137] should_failslab+0x9/0x14 [ 919.135893][T19137] kmem_cache_alloc_trace+0x2d1/0x760 [ 919.141337][T19137] kvm_irqfd+0xbe/0x19e0 [ 919.145611][T19137] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 919.151852][T19137] ? _copy_from_user+0xdd/0x150 [ 919.156710][T19137] kvm_vm_ioctl+0x4af/0x1900 [ 919.161313][T19137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.167555][T19137] ? kvm_unregister_device_ops+0x70/0x70 [ 919.173192][T19137] ? is_dynamic_key+0x1c0/0x1c0 [ 919.178058][T19137] ? kernel_text_address+0x73/0xf0 [ 919.183167][T19137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.189413][T19137] ? _parse_integer+0x139/0x190 [ 919.194265][T19137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 919.200500][T19137] ? _kstrtoull+0x14c/0x200 [ 919.205021][T19137] ? _parse_integer+0x190/0x190 [ 919.209877][T19137] ? lock_downgrade+0x880/0x880 [ 919.214782][T19137] ? tomoyo_domain+0xc5/0x160 [ 919.219459][T19137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 919.225732][T19137] ? tomoyo_init_request_info+0x105/0x1d0 [ 919.231493][T19137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.237761][T19137] ? tomoyo_path_number_perm+0x263/0x520 [ 919.243384][T19137] ? find_held_lock+0x35/0x130 [ 919.248144][T19137] ? tomoyo_execute_permission+0x4a0/0x4a0 [ 919.253976][T19137] ? __fget+0x35a/0x550 [ 919.258160][T19137] ? kvm_unregister_device_ops+0x70/0x70 [ 919.263802][T19137] do_vfs_ioctl+0xd6e/0x1390 [ 919.268413][T19137] ? ioctl_preallocate+0x210/0x210 [ 919.273543][T19137] ? smack_file_ioctl+0x196/0x310 [ 919.278566][T19137] ? smack_inode_link+0x2d0/0x2d0 [ 919.283597][T19137] ? ksys_dup3+0x3e0/0x3e0 [ 919.288009][T19137] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 919.294260][T19137] ? fput_many+0x12c/0x1a0 [ 919.298683][T19137] ? tomoyo_file_ioctl+0x23/0x30 [ 919.303643][T19137] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 919.309892][T19137] ? security_file_ioctl+0x93/0xc0 [ 919.315007][T19137] ksys_ioctl+0xab/0xd0 [ 919.319169][T19137] __x64_sys_ioctl+0x73/0xb0 [ 919.323769][T19137] do_syscall_64+0x103/0x610 [ 919.328383][T19137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 919.334265][T19137] RIP: 0033:0x457f29 [ 919.338166][T19137] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 919.357769][T19137] RSP: 002b:00007fb57477ec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 919.366177][T19137] RAX: ffffffffffffffda RBX: 00007fb57477ec90 RCX: 0000000000457f29 [ 919.374146][T19137] RDX: 0000000020000000 RSI: 000000004020ae76 RDI: 0000000000000004 [ 919.382112][T19137] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 919.390077][T19137] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fb57477f6d4 00:41:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x40000000) 00:41:05 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x3f5ed5ca) [ 919.398067][T19137] R13: 00000000004c0d92 R14: 00000000004d2bc8 R15: 0000000000000006 00:41:05 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:05 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x0, 0x0, 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:05 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) getgroups(0x4, &(0x7f00000003c0)=[0xee01, 0x0, 0x0, 0xee00]) 00:41:05 executing program 3 (fault-call:3 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:41:05 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x40000000) 00:41:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x40a44291) 00:41:05 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 919.705568][T19281] validate_nla: 3 callbacks suppressed [ 919.705576][T19281] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:05 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2}) 00:41:05 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x40a44291) 00:41:05 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) getsockopt$inet_IP_IPSEC_POLICY(r1, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@dev, @in6=@empty}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000380)=0xe8) 00:41:05 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x42007375) [ 919.941176][T19404] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:05 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x42007375) 00:41:05 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x2, &(0x7f0000000000)={r2}) 00:41:05 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:06 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:06 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) syz_open_dev$adsp(&(0x7f0000000200)='/dev/adsp#\x00', 0x6, 0x103000) 00:41:06 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4239b54c) 00:41:06 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) [ 920.189259][T19510] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:06 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 00:41:06 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x5421, &(0x7f0000000000)={r2}) 00:41:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4239b54c) 00:41:06 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x43731c8e) 00:41:06 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) [ 920.455221][T19642] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:06 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:06 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:06 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x48000000) 00:41:06 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x5450, &(0x7f0000000000)={r2}) 00:41:06 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x0, 0x0, 0x0) io_destroy(r0) 00:41:06 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x43731c8e) 00:41:06 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 920.760752][T19860] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:06 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x48055d8d) 00:41:06 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x0, 0x0, 0x0) io_destroy(r0) 00:41:06 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:06 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4844fb31) 00:41:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x5451, &(0x7f0000000000)={r2}) 00:41:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x48000000) 00:41:07 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4c000000) 00:41:07 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x0, 0x0, 0x0) io_destroy(r0) 00:41:07 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:07 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) perf_event_open(&(0x7f000025c000)={0x2, 0x70, 0x1e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x48055d8d) 00:41:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4cb53942) 00:41:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x5452, &(0x7f0000000000)={r2}) 00:41:07 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) io_destroy(r0) 00:41:07 executing program 2: openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x0, 0x0) r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:07 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4f133520) [ 921.613086][T20467] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4844fb31) 00:41:07 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) io_destroy(r0) 00:41:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4ffb477c) 00:41:07 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x5460, &(0x7f0000000000)={r2}) 00:41:07 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:07 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:07 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5011505a) 00:41:07 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) io_destroy(r0) 00:41:07 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4afdcebc) [ 921.888093][T20664] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:07 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:07 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xae03, &(0x7f0000000000)={r2}) 00:41:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x50602d5d) 00:41:08 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) io_destroy(r0) 00:41:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4c000000) 00:41:08 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:08 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x508b2378) 00:41:08 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) io_destroy(r0) 00:41:08 executing program 2: r0 = socket$kcm(0x10, 0x0, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xae41, &(0x7f0000000000)={r2}) 00:41:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4cb53942) 00:41:08 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x53cfb220) 00:41:08 executing program 2: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:08 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) io_destroy(r0) 00:41:08 executing program 2: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x54a41310) 00:41:08 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4f133520) 00:41:08 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x0, 0x0) io_destroy(r0) 00:41:08 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:08 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x40049409, &(0x7f0000000000)={r2}) 00:41:08 executing program 2: socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:08 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x56f7dfd8) 00:41:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 00:41:09 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x0, 0x0) io_destroy(r0) 00:41:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x4ffb477c) 00:41:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4008ae61, &(0x7f0000000000)={r2}) 00:41:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 00:41:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x570c087b) 00:41:09 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x0, 0x0) io_destroy(r0) 00:41:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5011505a) 00:41:09 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x58769093) 00:41:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, 0x0, 0x0) 00:41:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4008ae6a, &(0x7f0000000000)={r2}) 00:41:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x50602d5d) 00:41:09 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x0, &(0x7f0000000080)) io_destroy(r0) 00:41:09 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:41:09 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x594601ce) 00:41:09 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x508b2378) 00:41:10 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x0, &(0x7f0000000080)) io_destroy(r0) 00:41:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:41:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5a501150) 00:41:10 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(0x0) 00:41:10 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4010ae42, &(0x7f0000000000)={r2}) 00:41:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) 00:41:10 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x0, &(0x7f0000000080)) io_destroy(r0) 00:41:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5b57ef26) 00:41:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x53cfb220) 00:41:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 00:41:10 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5b5e408d) 00:41:10 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[0x0]) io_destroy(r0) 00:41:10 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x54a41310) 00:41:10 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 00:41:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4010ae67, &(0x7f0000000000)={r2}) 00:41:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)}, 0x0) 00:41:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5bdd7665) 00:41:11 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[0x0]) io_destroy(r0) 00:41:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x56f7dfd8) 00:41:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4010ae68, &(0x7f0000000000)={r2}) 00:41:11 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5d2d6050) 00:41:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 00:41:11 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[0x0]) io_destroy(r0) 00:41:11 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x570c087b) 00:41:11 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x1, &(0x7f0000d83f60)=[{}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:11 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5e83bb8f) 00:41:11 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020940d, &(0x7f0000000000)={r2}) 00:41:11 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 00:41:12 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:41:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5f0f1bea) 00:41:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{0x0}], 0x1}, 0x0) 00:41:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) 00:41:12 executing program 5 (fault-call:1 fault-nth:0): io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x58000000) 00:41:12 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:41:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5f23e2d7) 00:41:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) 00:41:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae46, &(0x7f0000000000)={r2}) 00:41:12 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x58769093) 00:41:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5f6e9eb9) 00:41:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)}], 0x1}, 0x0) 00:41:12 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:41:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x618bcef3) 00:41:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000", 0x17}], 0x1}, 0x0) 00:41:12 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x4, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:12 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020aea5, &(0x7f0000000000)={r2}) 00:41:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6576dd5b) 00:41:12 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(0x0) 00:41:12 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x594601ce) 00:41:12 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000", 0x17}], 0x1}, 0x0) 00:41:12 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x4, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:12 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x67211c00) 00:41:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b0000", 0x17}], 0x1}, 0x0) 00:41:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x68000000) 00:41:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4040ae79, &(0x7f0000000000)={r2}) 00:41:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5a501150) 00:41:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000300520000", 0x23}], 0x1}, 0x0) 00:41:13 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6a23c7e5) 00:41:13 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(0x0) 00:41:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000300520000", 0x23}], 0x1}, 0x0) 00:41:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5b57ef26) 00:41:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6c000000) 00:41:13 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4068aea3, &(0x7f0000000000)={r2}) 00:41:13 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = socket$inet_sctp(0x2, 0x1, 0x84) fsetxattr$security_ima(r1, &(0x7f0000000000)='security.ima\x00', &(0x7f0000000040)=@v2={0x5, 0x2, 0x100000001, 0x6, 0xce, "5d59fbe3976db6a36ef78b4a40cb2039fb85d5ff16fa9aeab5f25b8e85f682030164936a709f9c095677c168cc1cdb682f7e808fd6f1abe59127fc4d8f030d37e87823f95bc94aedbfef836793fc0fb2c787738dfda848d94694aa3f74fc0c4894862f3fa3746a6aed9a80c5f85a6fa41802b15d15f367e57bcff6104aebb8f80e8270f0c6fadc76dd8b63aa5e5853e896243dc99b9624582939326a3a7ec26f6fe421cdab049849347613fd7388f4f3b95e19b2edbaf3ac040710b96297bfbaf4a678880e7bbc7d22aabd48bafe"}, 0xd8, 0x3) io_destroy(r0) 00:41:13 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb12000300520000", 0x23}], 0x1}, 0x0) 00:41:13 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6d17f90d) 00:41:13 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r1, 0x1000008912, &(0x7f0000000100)="0adc1f123c123f3188b070") r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = ioctl$KVM_CREATE_VCPU(r3, 0xae41, 0x0) ioctl$KVM_ENABLE_CAP_CPU(r4, 0x4008ae89, &(0x7f0000000000)={0x6, 0x600000000000000, [0x1000000040000080, 0x0, 0x6e0], [0xc2]}) io_destroy(r0) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) r7 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_SET(r5, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000340)={0x25c, r7, 0x2, 0x70bd2c, 0x25dfdbfd, {}, [@TIPC_NLA_BEARER={0x100, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @local}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x7, @dev={0xfe, 0x80, [], 0xc}, 0x5}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x1, @dev={0xfe, 0x80, [], 0x2b}, 0xce}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x40, @loopback, 0x8}}}}, @TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'eth', 0x3a, 'veth1_to_team\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x79}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz2\x00'}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x3}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}, @TIPC_NLA_BEARER_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffffffff80000000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xf}]}]}, @TIPC_NLA_MON={0x44, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x60c9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x6}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x7}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x78, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'eth', 0x3a, 'gre0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e22, @multicast2}}, {0x20, 0x2, @in6={0xa, 0x4e22, 0x9, @mcast2, 0x201}}}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'ib', 0x3a, 'ip6erspan0\x00'}}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_NET={0x18, 0x7, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7ff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x200}]}, @TIPC_NLA_NODE={0x8, 0x6, [@TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0x64, 0x5, [@TIPC_NLA_MEDIA_PROP={0x4}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xc}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xb161}]}]}]}, 0x25c}, 0x1, 0x0, 0x0, 0x4000000}, 0x20000050) getsockopt$packet_buf(r6, 0x107, 0x0, &(0x7f0000000040)=""/142, &(0x7f0000000100)=0x8e) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r5, 0x84, 0x1d, &(0x7f0000000240)={0x2, [0x0, 0x0]}, &(0x7f0000000280)=0xc) ioctl$KVM_CHECK_EXTENSION(r5, 0xae03, 0x0) 00:41:13 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5b5e408d) 00:41:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc0045878, &(0x7f0000000000)={r2}) 00:41:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ff", 0x29}], 0x1}, 0x0) [ 928.082544][T24141] kvm [24138]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 [ 928.209936][T24139] kvm [24138]: vcpu0, guest rIP: 0xfff0 disabled perfctr wrmsr: 0xc2 data 0x0 00:41:14 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(0x0) 00:41:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x736408ff) 00:41:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ff", 0x29}], 0x1}, 0x0) 00:41:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5bdd7665) 00:41:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc0045878, &(0x7f0000000000)={r2}) 00:41:14 executing program 5: acct(&(0x7f0000000540)='./file0\x00') io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/null\x00', 0x40, 0x0) fsetxattr(r1, &(0x7f00000004c0)=@known='security.apparmor\x00', &(0x7f0000000500)='\x00', 0x1, 0x2) sendto$unix(r1, &(0x7f0000000340)="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", 0xfd, 0x86c0681c96671e30, &(0x7f0000000280)=@abs={0x1, 0x0, 0x4e22}, 0x6e) pselect6(0x40, &(0x7f0000000000)={0x7, 0xfffffffffffffa42, 0xfffffffeffffffff, 0x3ff, 0xdc, 0x200, 0x77, 0x10000}, &(0x7f0000000040)={0x7fff, 0x3ff, 0x9, 0x0, 0x6, 0x5, 0xa9, 0x5}, &(0x7f0000000080)={0x6, 0x1, 0x1, 0x1, 0x43f, 0x1f, 0x0, 0x66e}, &(0x7f0000000580)={0x0, 0x1c9c380}, &(0x7f0000000140)={&(0x7f0000000100)={0x800}, 0x3ce}) r2 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x4000, 0x0) r3 = getuid() mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f00000005c0)='9p\x00', 0x2000028, &(0x7f0000000600)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0x4}}, {@access_user='access=user'}, {@privport='privport'}, {@cache_loose='cache=loose'}, {@afid={'afid', 0x3d, 0x7}}, {@debug={'debug', 0x3d, 0x9805}}], [{@fsuuid={'fsuuid', 0x3d, {[0x36, 0x38, 0x7f, 0x7f, 0x35, 0x3f, 0x38, 0x33], 0x2d, [0x34, 0x64, 0x61, 0x7f], 0x2d, [0x62, 0x30, 0x36], 0x2d, [0x61, 0x76, 0x37, 0x31], 0x2d, [0x32, 0x77, 0x34, 0x30, 0x37, 0x77, 0x77, 0x65]}}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\x00'}}, {@subj_type={'subj_type', 0x3d, '&ppp1-(GPL(security}cpusetnodevcgroup'}}, {@obj_user={'obj_user', 0x3d, '/dev/sequencer2\x00'}}, {@fowner_lt={'fowner<', r3}}, {@hash='hash'}]}}) getsockopt$inet_sctp6_SCTP_AUTOCLOSE(r2, 0x84, 0x4, &(0x7f0000000240), &(0x7f0000000200)=0x8af227e0) r4 = gettid() rt_sigqueueinfo(r4, 0x3e, &(0x7f0000000440)={0x5, 0x100000001, 0x8}) 00:41:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ff", 0x29}], 0x1}, 0x0) 00:41:14 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x73746174) 00:41:14 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5d2d6050) 00:41:14 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x10000, 0x10100) ioctl$KVM_GET_CPUID2(r1, 0xc008ae91, &(0x7f0000000040)={0x6, 0x0, [{}, {}, {}, {}, {}, {}]}) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) io_submit(r0, 0x8, &(0x7f0000000900)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x8, 0x8000, r1, &(0x7f0000000140)="9b79508ea5aa238dd6f5a6d9c562abfc5050e0a9f0f1389882cd6a69143fc65e0b26643c31b8c10f4f62df31a46addcee1c014ce3003ccd604c934e8b7bf76849e986e5cc98b5157f135fddbb4943bc10549098f6c491b1ec753852526618b7ce8f82e", 0x63, 0x8, 0x0, 0x0, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0xc2b, r1, &(0x7f0000000200)="3bade9e38cd3900b64d117f9eff0e02d269fafd8567c3bf74f38b8c180c4a3fc3264efe7ee767d7b42256e898cf311dc1795c20e2cc38b615e2020acf6fd32c5316b31ce37fb76b029d9b343548a97ff82b66c91133d821546671275c80061e4ff92035959c198b99403d02af24b25c6c0c112c2bfc51108543bcc5e4c6ba4", 0x7f, 0x0, 0x0, 0x3, r1}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0xe9, r1, &(0x7f0000000340)="676f6dff55d8c6d39b1f652fa72e6b99669cbdd9b0aa7a4f987a243ffd7733b5ef5558ad087d751b3db3444cdadafbc543438ee0c71157a2435d93fda56ec6b27fa102b3e1505985dee6e6a66d3550afcc8c748dd32fc84d9707f792ae6182eec6d9ac9b15dabb7d784429843af698009b94bbf365fe737814abb45b7f", 0x7d, 0x9, 0x0, 0x3, r1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x9, r1, &(0x7f00000003c0)="62cd635eeb9a9911ad71121c6347071c307714b3fe8b3085dc5487a01683df010e6f3d8d9405803814a3af65126882beb2c409e33b8c430f6157c0645ae9daa3d61a83bffda119acc3c7fef2a2bca432b59b43297ed58a31ad25", 0x5a, 0x789, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x7, r1, &(0x7f0000000480)="7ae23113699b2d1397071c7f8bf9223fc722e3d2076033278e140d74cc3882930f86173639c4965b9b5e60bc931c857234e47838046dc30819c203cf81aba4d289f107ab5050bbacfbafbaf3f0b1bf8bf1d79cfae72937183e51cf87ee7acb19a791814279123bfa6d1d9f330318bdf150ca694aa890101426b439e8dfc19e46b77941e5362429ce1c0b7292b046a8a52a53f1d53eabd0b6c2e585c8431865f987c46128ddfad3e99c6b24fd978b5fc09141269e990574bf2f350eec65eb81bb2f64db6726922c25bbe428f9ca2903c18aa37d2fede6dcec80eeaf46cd2a64a50d22e71f9f99bad6f7e60774f8b5d100e1d7", 0xf2, 0x7, 0x0, 0x1, r1}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x5, 0x4, r1, &(0x7f00000005c0)="d9e9d264d8ab0fe5023d5be652da57c82e424abf33471c5eaf3154cbd79a7c45444d9865819365d6a8350622ab03407556a2bb5792595a066b82f46ed186813271cfd6846ba524106ddbf87f2645624b78cca05c3adb8951c139e4a16bcd2ea62834f6f74134e544c68e53ec36bfb0602d13cb2915939328fd474efed6c6a5553c9cc011f7cb9560288ca3597a7de997e720837571f2c25ae968ed0d53a589be", 0xa0, 0x1, 0x0, 0x1, r1}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x3, 0x4, r1, &(0x7f00000006c0)="0a401e6287dc35c216d9699323bcaf5566c45fa966fc71e5ee3b400a413fbae44c9be1673c12161f3f4b66a7b5ea4e0c9a0600283bae55687715f02b6846021e9070720f25c11a5bce1b68472cd2a7fd76db662de1c5306c7340eb18ffbd6d5e17c6d05bf683fa460f006cd6868173dda6c31ad7c913a74c6de85630e7a2d0043d4fc597527a3346aaac8c040302df5c10aa140fc9fe4dd7377a08080c162e61e2d772eedf235dbe5c59226c0b307fdba27260b68a07c74b1b7e8a24ae8895206cf34a993d5ef90ccc2c6a0b57", 0xfffffffffffffd77, 0x1, 0x0, 0x0, r1}, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x5, 0x101, r1, &(0x7f0000000800)="054ca47510adab30729bb1f841829ce7125e88896a03f7aeeeda9ca3f0946a0a2d171c2db5e901bca83f5676a84cfe936140c822e7160b084e904f63bb2ce711c103243fac90b34661c3d677471c453a905156720a31915fe9cdef7b06111b64ea987b100bf65bf4cb5526f6c3f5ae946de8b7d0f6400569ee6c68ae9b6027c7057fab1da4e4f1350003a5e265ae9a27ad7e677b529e79ebd8aaeaa6b9b94e8f", 0xa0, 0xfffffffffffffb07, 0x0, 0x0, 0xffffffffffffff9c}]) 00:41:14 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe20000", 0x2c}], 0x1}, 0x0) 00:41:14 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc008ae67, &(0x7f0000000000)={r2}) 00:41:15 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc00caee0, &(0x7f0000000000)={r2}) 00:41:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe20000", 0x2c}], 0x1}, 0x0) 00:41:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x74000000) 00:41:15 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_destroy(r0) openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x200, 0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5e83bb8f) 00:41:15 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}]) io_destroy(r0) 00:41:15 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe20000", 0x2c}], 0x1}, 0x0) 00:41:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x742909a6) 00:41:15 executing program 5: r0 = open(&(0x7f00000003c0)='./file0\x00', 0x5c1102, 0x9) sendmsg$unix(r0, &(0x7f0000000700)={&(0x7f0000000400)=@abs={0x1, 0x0, 0x4e24}, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000480)="312272db56012a0cccde6586512a58e3d100173ccf2d88d2511d3d", 0x1b}, {&(0x7f00000004c0)="ea6c65605256e9dc6b6806bf63f8b8854c2d471723e42dcc554f11fb8a028152c7b5992e1262bba9e4b7d6c4e7371ce4dc6232295ab157afb6477f90f40c5a9c275f3d18e18173c58dd4acc84484be618018b41c6e4f", 0x56}, {&(0x7f0000000540)="346fb78453883ac7d4d9df6ada854a816c4fa0b5065a3ba7011b60de63ac045424dcbc3aaa765053776bf910f7744925b50e9df79a4c2397081877a84cf3736231e58baf1dbdfdfb2eab38f19c754af58410b3f27bdc00180b7fbd8e3bf20b433a827a", 0x63}, {&(0x7f00000005c0)="51923cae9d471767187c3fad371706e8a2e8a7e8c2d00fec60c31f4008db9d901c405b4219d105629fdb47952e04f35949aa1df6cec56370c10c5823e90b1b6f53e701232777c088cd", 0x49}, {&(0x7f0000000640)="193f2533a05f38fcb5c30d83d1ed2c6c2bfe", 0x12}], 0x5}, 0x1) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) write$P9_RWRITE(r0, &(0x7f00000000c0)={0xb, 0x77, 0x2, 0xffffffffffff0000}, 0xb) r2 = openat$audio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/audio\x00', 0x8000, 0x0) ioctl$VT_RESIZE(r2, 0x5609, &(0x7f0000000080)={0x3ff, 0x0, 0x6}) ioctl$ASHMEM_GET_PROT_MASK(r2, 0x7706, &(0x7f0000000040)) io_destroy(r1) 00:41:15 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5f0f1bea) 00:41:15 executing program 4 (fault-call:1 fault-nth:0): io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:15 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x74617473) 00:41:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe2000000", 0x2d}], 0x1}, 0x0) 00:41:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc0189436, &(0x7f0000000000)={r2}) [ 930.065931][T25032] FAULT_INJECTION: forcing a failure. [ 930.065931][T25032] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 930.107354][T25032] CPU: 0 PID: 25032 Comm: syz-executor.4 Not tainted 5.0.0+ #16 [ 930.115003][T25032] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.125057][T25032] Call Trace: [ 930.125141][T25032] dump_stack+0x172/0x1f0 [ 930.125178][T25032] should_fail.cold+0xa/0x15 [ 930.125213][T25032] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 930.125233][T25032] ? lock_downgrade+0x880/0x880 [ 930.132836][T25032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.132855][T25032] ? kasan_check_read+0x11/0x20 [ 930.132872][T25032] should_fail_alloc_page+0x50/0x60 [ 930.132898][T25032] __alloc_pages_nodemask+0x1a1/0x7e0 [ 930.132923][T25032] ? __lock_acquire+0x548/0x3fb0 [ 930.132950][T25032] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 930.132993][T25032] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 930.143352][T25032] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 930.143370][T25032] alloc_pages_vma+0x39a/0x540 [ 930.143390][T25032] do_huge_pmd_anonymous_page+0x509/0x1730 00:41:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe2000000", 0x2d}], 0x1}, 0x0) 00:41:16 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = getuid() lsetxattr$security_capability(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.capability\x00', &(0x7f0000000080)=@v3={0x3000000, [{0xffffffffffff06e2, 0x7fb3}, {0x8, 0x80ba}], r1}, 0x18, 0x1) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffffff, 0x80000) r3 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x80180, 0x0) r4 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vcs\x00', 0x90180, 0x0) r5 = openat$userio(0xffffffffffffff9c, &(0x7f0000001680)='/dev/userio\x00', 0x80, 0x0) r6 = syz_open_dev$sndpcmp(&(0x7f00000017c0)='/dev/snd/pcmC#D#p\x00', 0x7fffffff, 0x200) r7 = openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000001840)='/proc/self/attr/current\x00', 0x2, 0x0) r8 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001900)='/dev/vsock\x00', 0x0, 0x0) r9 = socket$nl_crypto(0x10, 0x3, 0x15) r10 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) r11 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000001a40)='/dev/dlm_plock\x00', 0x200, 0x0) r12 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001b00)='/dev/snapshot\x00', 0xa0581, 0x0) io_submit(r0, 0x6, &(0x7f0000001b80)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x6, 0x4, r2, &(0x7f00000000c0)="9b7c9587be6e54b930583316daa161a6d79250cf0cc8c4334c18d6e5edfbf7c536d9bf688b8ca244a238be078a13e420181b46fb75f7bd3e756e9788351010ead564adc9ae11970291d85d21041215cff3bb5378e234bfb201c31091d53827f919a317bb72276b6e9f6594669a532bed4ce05b746d19669b75f9dd16f57825cec8", 0x81, 0xff, 0x0, 0x1, r3}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x9, 0x3, r4, &(0x7f0000000340)="4b2fd895416d54f64137cc6c761efdb0594c049452b7509e6eb6ddde983f3e2ca054a6130c3cd9b429b9b7c0cf902741ce788baf081c2d680baff9dfe05ab1f4d3880e30cd107e960dcc520654cdfaa0affa1ee549e00153e83e8609d69ea8f0f13ed6d05e5ce6d90ad49c9e12b7f25c2f6f684765ecdf19a3328dbea4809b6b0bde38c0dc52c6bc4bc86e293785650cd25bc51f88ccfef9ec4619af7a3a2550946744fb5aa2d81176dd636bebf35f86dbcabd38ad0b1ef4bc8a33ea2c2ea08671de8ead680b11a5c500551539bd10452e71b7d206e04262eb1574099b4a5f4c70f3bd065a6e969e8b61cd554c58b9", 0xef, 0x400, 0x0, 0x2}, &(0x7f0000001800)={0x0, 0x0, 0x0, 0x2, 0x0, r5, &(0x7f00000016c0)="0a3a64cefd28aa3f9fa73b467b7ad10dc6dc6a3a4979aa9b18dc48da02de0f5ae0e458b038017858fa17ac3e682efaccf713e21eac1b4adc3b3d8d733e2fc96a047fc0a363d572a747f24f88a89132d9dc30751b6297db863009b39d3db113b2b14fe98dbd41a56d32bd1b533217c36bb014045aa26370d1560bdc609b1d53bd6841004908ad50fff2f60e1c8dab72e4da3b11b083c1d84d81d290f3116c73a9805eced523eb352b9a56fea6c9ae07869c833ecb83d14646553e5c8c37b3aaf173821806e1f86b645e86c3b1c2aee778d34a14cf195ce98f", 0xd8, 0xffffffffffffff4f, 0x0, 0x2, r6}, &(0x7f0000001940)={0x0, 0x0, 0x0, 0x7, 0xffff, r7, &(0x7f0000001880)="cdbfe84a1d6dec83fcb909754a549c6f3a3b6170f3c03c30ae7ac539fbb8f58fda052ce03b8e007fcdf0c388d2adeeabbd243b03c37f593ca9cca3293fd1df2a8ece3821e15e58e2a20113fbed065cc581455c9294f044ac89d9a9ffbbb8bcba6a1a1e62aa2fcae86e", 0x69, 0x8, 0x0, 0x2, r8}, &(0x7f0000001a00)={0x0, 0x0, 0x0, 0x6, 0x6, r9, &(0x7f0000001980)="857cb977d92367751d07bce919f5dff18617dc0d1c7356be564109d217daf88f6b524f0bac7651e8dd18a11a5de45936ad96388d329240064900cba3811d539abf5e5636b6ffc278e2c55a5791e0a101e7dd18735fd54e29cd70d1b69b7d4ff8c5f43eb7f6d9ba89f464f64db6e0c36a8cb5d7ca", 0x74, 0x3, 0x0, 0x0, r10}, &(0x7f0000001b40)={0x0, 0x0, 0x0, 0x3, 0x200, r11, &(0x7f0000001a80)="ba60210febaecfa1bd5d6e3f45badc748da193682a4ee9a2b0912ff267d87385b05c808de1a1ba363382d7968f0c38fcce3abe5624f1864796ba9ac9c5fa02ba5a67cb60c73091a37f56175e7da5e31a21c77472793f5d59e82f560b0775bcbc92aeac5a57e534", 0x67, 0x3, 0x0, 0x2, r12}]) io_destroy(r0) [ 930.143404][T25032] ? reacquire_held_locks+0xfb/0x520 [ 930.143417][T25032] ? alloc_set_pte+0xf08/0x1900 [ 930.143436][T25032] ? __thp_get_unmapped_area+0x190/0x190 [ 930.143448][T25032] ? pmd_val+0x100/0x100 [ 930.143461][T25032] ? __lock_acquire+0x548/0x3fb0 [ 930.143481][T25032] __handle_mm_fault+0x2d5e/0x3ec0 [ 930.164577][T25032] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 930.164591][T25032] ? find_held_lock+0x35/0x130 [ 930.164606][T25032] ? handle_mm_fault+0x322/0xb30 [ 930.164627][T25032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.164655][T25032] ? kasan_check_read+0x11/0x20 [ 930.164712][T25032] handle_mm_fault+0x43f/0xb30 [ 930.203791][T25032] __do_page_fault+0x5ef/0xda0 [ 930.203817][T25032] do_page_fault+0x71/0x581 [ 930.203835][T25032] page_fault+0x1e/0x30 [ 930.203849][T25032] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 930.203863][T25032] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a 00:41:16 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc018aec0, &(0x7f0000000000)={r2}) [ 930.203877][T25032] RSP: 0018:ffff88805adcfbc8 EFLAGS: 00010202 [ 930.223813][T25032] RAX: ffffed1012c8d208 RBX: 0000000000000020 RCX: 0000000000000004 [ 930.223821][T25032] RDX: 0000000000000000 RSI: ffff888096469020 RDI: 0000000020d83f60 [ 930.223830][T25032] RBP: ffff88805adcfc00 R08: 0000000000000000 R09: ffffed1012c8d208 [ 930.223838][T25032] R10: ffffed1012c8d207 R11: ffff88809646903f R12: 0000000020d83f60 [ 930.223847][T25032] R13: ffff888096469020 R14: 0000000020d83f80 R15: 00007ffffffff000 [ 930.223878][T25032] ? _copy_to_user+0xf7/0x120 [ 930.310329][T25032] aio_read_events+0x3ac/0x880 [ 930.310356][T25032] read_events+0x2f4/0x360 [ 930.310382][T25032] ? aio_read_events+0x880/0x880 [ 930.326305][T25032] ? lock_downgrade+0x880/0x880 [ 930.326319][T25032] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.326366][T25032] ? finish_wait+0x260/0x260 [ 930.326430][T25032] ? clock_was_set_work+0x30/0x30 [ 930.326450][T25032] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 930.359742][T25032] do_io_getevents+0x10d/0x3a0 [ 930.369083][T25032] __x64_sys_io_getevents+0x195/0x2d0 [ 930.369101][T25032] ? __ia32_sys_io_cancel+0x5a0/0x5a0 [ 930.369115][T25032] ? do_syscall_64+0x26/0x610 [ 930.369130][T25032] ? lockdep_hardirqs_on+0x418/0x5d0 [ 930.369146][T25032] ? trace_hardirqs_on+0x67/0x230 [ 930.369166][T25032] do_syscall_64+0x103/0x610 [ 930.400914][T25032] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 930.400938][T25032] RIP: 0033:0x457f29 00:41:16 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5f23e2d7) 00:41:16 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe2000000", 0x2d}], 0x1}, 0x0) 00:41:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x75730042) [ 930.400952][T25032] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 930.400960][T25032] RSP: 002b:00007f74c1156c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d0 [ 930.400973][T25032] RAX: ffffffffffffffda RBX: 00007f74c1156c90 RCX: 0000000000457f29 [ 930.400980][T25032] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 00007f74c1136000 [ 930.400987][T25032] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 930.400995][T25032] R10: 0000000020d83f60 R11: 0000000000000246 R12: 00007f74c11576d4 [ 930.401002][T25032] R13: 00000000004bf10b R14: 00000000004d0a68 R15: 0000000000000003 00:41:16 executing program 4 (fault-call:1 fault-nth:1): io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:16 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x75e42b2b) 00:41:16 executing program 2 (fault-call:1 fault-nth:0): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 930.724744][T25414] FAULT_INJECTION: forcing a failure. [ 930.724744][T25414] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 930.761929][T25470] FAULT_INJECTION: forcing a failure. [ 930.761929][T25470] name failslab, interval 1, probability 0, space 0, times 0 [ 930.778987][T25414] CPU: 0 PID: 25414 Comm: syz-executor.4 Not tainted 5.0.0+ #16 [ 930.786620][T25414] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 930.797174][T25414] Call Trace: [ 930.800484][T25414] dump_stack+0x172/0x1f0 [ 930.804816][T25414] should_fail.cold+0xa/0x15 [ 930.809406][T25414] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 930.815253][T25414] ? ___might_sleep+0x163/0x280 [ 930.820115][T25414] should_fail_alloc_page+0x50/0x60 [ 930.825307][T25414] __alloc_pages_nodemask+0x1a1/0x7e0 [ 930.830735][T25414] ? mem_cgroup_throttle_swaprate+0x196/0x66e [ 930.836814][T25414] ? __alloc_pages_slowpath+0x28b0/0x28b0 [ 930.842582][T25414] ? kasan_check_read+0x11/0x20 [ 930.847455][T25414] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 930.853712][T25414] alloc_pages_current+0x107/0x210 [ 930.859732][T25414] pte_alloc_one+0x1b/0x1a0 [ 930.864239][T25414] do_huge_pmd_anonymous_page+0x6f4/0x1730 [ 930.870040][T25414] ? reacquire_held_locks+0xfb/0x520 [ 930.875323][T25414] ? alloc_set_pte+0xf08/0x1900 [ 930.880185][T25414] ? __thp_get_unmapped_area+0x190/0x190 [ 930.885928][T25414] ? __lock_acquire+0x548/0x3fb0 [ 930.890887][T25414] __handle_mm_fault+0x2d5e/0x3ec0 [ 930.896010][T25414] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 930.901568][T25414] ? find_held_lock+0x35/0x130 [ 930.906575][T25414] ? handle_mm_fault+0x322/0xb30 [ 930.911545][T25414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 930.917785][T25414] ? kasan_check_read+0x11/0x20 [ 930.922633][T25414] handle_mm_fault+0x43f/0xb30 [ 930.927413][T25414] __do_page_fault+0x5ef/0xda0 [ 930.932200][T25414] do_page_fault+0x71/0x581 [ 930.936735][T25414] page_fault+0x1e/0x30 [ 930.940884][T25414] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 930.947203][T25414] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 930.966800][T25414] RSP: 0018:ffff88805b21fbc8 EFLAGS: 00010202 [ 930.972871][T25414] RAX: ffffed1013fa3008 RBX: 0000000000000020 RCX: 0000000000000004 [ 930.980861][T25414] RDX: 0000000000000000 RSI: ffff88809fd18020 RDI: 0000000020d83f60 [ 930.988838][T25414] RBP: ffff88805b21fc00 R08: 0000000000000000 R09: ffffed1013fa3008 [ 930.996822][T25414] R10: ffffed1013fa3007 R11: ffff88809fd1803f R12: 0000000020d83f60 [ 931.004789][T25414] R13: ffff88809fd18020 R14: 0000000020d83f80 R15: 00007ffffffff000 [ 931.012779][T25414] ? _copy_to_user+0xf7/0x120 [ 931.017466][T25414] aio_read_events+0x3ac/0x880 [ 931.022281][T25414] read_events+0x2f4/0x360 [ 931.026732][T25414] ? aio_read_events+0x880/0x880 [ 931.031683][T25414] ? lock_downgrade+0x880/0x880 [ 931.036533][T25414] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.042765][T25414] ? finish_wait+0x260/0x260 [ 931.047356][T25414] ? clock_was_set_work+0x30/0x30 [ 931.052413][T25414] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 931.058656][T25414] do_io_getevents+0x10d/0x3a0 [ 931.063439][T25414] __x64_sys_io_getevents+0x195/0x2d0 [ 931.068811][T25414] ? __ia32_sys_io_cancel+0x5a0/0x5a0 [ 931.074183][T25414] ? do_syscall_64+0x26/0x610 [ 931.078864][T25414] ? lockdep_hardirqs_on+0x418/0x5d0 [ 931.084144][T25414] ? trace_hardirqs_on+0x67/0x230 [ 931.089187][T25414] do_syscall_64+0x103/0x610 [ 931.093786][T25414] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.099704][T25414] RIP: 0033:0x457f29 [ 931.103610][T25414] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.123205][T25414] RSP: 002b:00007f74c1156c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d0 [ 931.131610][T25414] RAX: ffffffffffffffda RBX: 00007f74c1156c90 RCX: 0000000000457f29 [ 931.139578][T25414] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 00007f74c1136000 [ 931.147538][T25414] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 931.155500][T25414] R10: 0000000020d83f60 R11: 0000000000000246 R12: 00007f74c11576d4 [ 931.163465][T25414] R13: 00000000004bf10b R14: 00000000004d0a68 R15: 0000000000000003 [ 931.171450][T25470] CPU: 1 PID: 25470 Comm: syz-executor.2 Not tainted 5.0.0+ #16 [ 931.179081][T25470] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.189129][T25470] Call Trace: [ 931.189149][T25470] dump_stack+0x172/0x1f0 [ 931.189171][T25470] should_fail.cold+0xa/0x15 [ 931.189201][T25470] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 931.207193][T25470] ? ___might_sleep+0x163/0x280 [ 931.212045][T25470] __should_failslab+0x121/0x190 [ 931.216985][T25470] should_failslab+0x9/0x14 [ 931.217000][T25470] kmem_cache_alloc_node+0x264/0x710 [ 931.217075][T25470] __alloc_skb+0xd5/0x5e0 [ 931.217093][T25470] ? skb_trim+0x190/0x190 [ 931.235488][T25470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.241808][T25470] ? netlink_autobind.isra.0+0x228/0x310 [ 931.247470][T25470] netlink_sendmsg+0x97b/0xd70 [ 931.247492][T25470] ? netlink_unicast+0x720/0x720 [ 931.247512][T25470] ? tomoyo_socket_sendmsg+0x26/0x30 [ 931.247526][T25470] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.247543][T25470] ? security_socket_sendmsg+0x93/0xc0 [ 931.247562][T25470] ? netlink_unicast+0x720/0x720 [ 931.257286][T25470] sock_sendmsg+0xdd/0x130 [ 931.257306][T25470] ___sys_sendmsg+0x806/0x930 [ 931.257325][T25470] ? copy_msghdr_from_user+0x430/0x430 [ 931.257348][T25470] ? kasan_check_read+0x11/0x20 [ 931.257366][T25470] ? __fget+0x381/0x550 [ 931.257385][T25470] ? ksys_dup3+0x3e0/0x3e0 [ 931.307121][T25470] ? lock_downgrade+0x880/0x880 [ 931.311990][T25470] ? __fget_light+0x1a9/0x230 [ 931.316667][T25470] ? __fdget+0x1b/0x20 [ 931.320746][T25470] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.327000][T25470] __sys_sendmsg+0x105/0x1d0 00:41:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x5f6e9eb9) 00:41:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0xc020660b, &(0x7f0000000000)={r2}) 00:41:17 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], 0x0) socketpair(0xf, 0x7, 0x20, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$bt_hci_HCI_TIME_STAMP(r1, 0x0, 0x3, &(0x7f0000000080)=0x100000001, 0x4) io_destroy(r0) 00:41:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7770c98b) [ 931.331588][T25470] ? __ia32_sys_shutdown+0x80/0x80 [ 931.336714][T25470] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 931.342169][T25470] ? do_syscall_64+0x26/0x610 [ 931.346896][T25470] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.346910][T25470] ? do_syscall_64+0x26/0x610 [ 931.346927][T25470] __x64_sys_sendmsg+0x78/0xb0 [ 931.346943][T25470] do_syscall_64+0x103/0x610 [ 931.346959][T25470] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.346969][T25470] RIP: 0033:0x457f29 [ 931.346982][T25470] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.346995][T25470] RSP: 002b:00007f775f094c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 931.367049][T25470] RAX: ffffffffffffffda RBX: 00007f775f094c90 RCX: 0000000000457f29 [ 931.367056][T25470] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 931.367064][T25470] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 00:41:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x618bcef3) [ 931.367071][T25470] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f775f0956d4 [ 931.367079][T25470] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000004 00:41:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x78238b50) 00:41:17 executing program 2 (fault-call:1 fault-nth:1): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:17 executing program 5: io_setup(0x3, &(0x7f00000000c0)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:17 executing program 4 (fault-call:1 fault-nth:2): io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:17 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6576dd5b) 00:41:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x785e91ea) [ 931.628632][T25795] FAULT_INJECTION: forcing a failure. [ 931.628632][T25795] name failslab, interval 1, probability 0, space 0, times 0 [ 931.692282][T25795] CPU: 0 PID: 25795 Comm: syz-executor.2 Not tainted 5.0.0+ #16 [ 931.699930][T25795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 931.710025][T25795] Call Trace: [ 931.713331][T25795] dump_stack+0x172/0x1f0 [ 931.717694][T25795] should_fail.cold+0xa/0x15 [ 931.722297][T25795] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 931.728108][T25795] ? ___might_sleep+0x163/0x280 [ 931.732976][T25795] __should_failslab+0x121/0x190 [ 931.737913][T25795] should_failslab+0x9/0x14 00:41:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7973e60c) [ 931.742427][T25795] kmem_cache_alloc_node_trace+0x270/0x720 [ 931.748243][T25795] __kmalloc_node_track_caller+0x3d/0x70 [ 931.753882][T25795] __kmalloc_reserve.isra.0+0x40/0xf0 [ 931.759261][T25795] __alloc_skb+0x10b/0x5e0 [ 931.763704][T25795] ? skb_trim+0x190/0x190 [ 931.763722][T25795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.763736][T25795] ? netlink_autobind.isra.0+0x228/0x310 [ 931.763752][T25795] netlink_sendmsg+0x97b/0xd70 [ 931.774346][T25795] ? netlink_unicast+0x720/0x720 [ 931.774366][T25795] ? tomoyo_socket_sendmsg+0x26/0x30 [ 931.774380][T25795] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 931.774395][T25795] ? security_socket_sendmsg+0x93/0xc0 [ 931.774409][T25795] ? netlink_unicast+0x720/0x720 [ 931.774426][T25795] sock_sendmsg+0xdd/0x130 [ 931.774443][T25795] ___sys_sendmsg+0x806/0x930 [ 931.774465][T25795] ? copy_msghdr_from_user+0x430/0x430 [ 931.826661][T25795] ? kasan_check_read+0x11/0x20 [ 931.831546][T25795] ? __fget+0x381/0x550 [ 931.835737][T25795] ? ksys_dup3+0x3e0/0x3e0 00:41:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x797a862a) [ 931.840160][T25795] ? lock_downgrade+0x880/0x880 [ 931.845033][T25795] ? __fget_light+0x1a9/0x230 [ 931.849716][T25795] ? __fdget+0x1b/0x20 [ 931.853783][T25795] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 931.860023][T25795] __sys_sendmsg+0x105/0x1d0 [ 931.864612][T25795] ? __ia32_sys_shutdown+0x80/0x80 [ 931.869775][T25795] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 931.875265][T25795] ? do_syscall_64+0x26/0x610 [ 931.879951][T25795] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.886022][T25795] ? do_syscall_64+0x26/0x610 [ 931.890740][T25795] __x64_sys_sendmsg+0x78/0xb0 [ 931.895510][T25795] do_syscall_64+0x103/0x610 [ 931.900114][T25795] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 931.906017][T25795] RIP: 0033:0x457f29 [ 931.909915][T25795] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 931.929520][T25795] RSP: 002b:00007f775f094c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e 00:41:17 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x80ffff}) 00:41:17 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x79966094) [ 931.929533][T25795] RAX: ffffffffffffffda RBX: 00007f775f094c90 RCX: 0000000000457f29 [ 931.929558][T25795] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 931.929566][T25795] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 931.929573][T25795] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f775f0956d4 [ 931.929581][T25795] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000004 00:41:17 executing program 2 (fault-call:1 fault-nth:2): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 931.990477][T25799] FAULT_INJECTION: forcing a failure. [ 931.990477][T25799] name failslab, interval 1, probability 0, space 0, times 0 [ 932.028252][T25799] CPU: 1 PID: 25799 Comm: syz-executor.4 Not tainted 5.0.0+ #16 [ 932.035900][T25799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.045979][T25799] Call Trace: [ 932.046019][T25799] dump_stack+0x172/0x1f0 [ 932.046046][T25799] should_fail.cold+0xa/0x15 [ 932.046083][T25799] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 932.046105][T25799] ? ___might_sleep+0x163/0x280 [ 932.046127][T25799] __should_failslab+0x121/0x190 [ 932.046148][T25799] should_failslab+0x9/0x14 [ 932.046175][T25799] kmem_cache_alloc+0x2b2/0x6f0 [ 932.046205][T25799] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 932.062850][T25939] FAULT_INJECTION: forcing a failure. [ 932.062850][T25939] name failslab, interval 1, probability 0, space 0, times 0 [ 932.064177][T25799] ptlock_alloc+0x20/0x70 [ 932.064212][T25799] pte_alloc_one+0x6d/0x1a0 [ 932.064229][T25799] do_huge_pmd_anonymous_page+0x6f4/0x1730 [ 932.064243][T25799] ? reacquire_held_locks+0xfb/0x520 [ 932.064256][T25799] ? alloc_set_pte+0xf08/0x1900 [ 932.064273][T25799] ? __thp_get_unmapped_area+0x190/0x190 [ 932.064287][T25799] ? __lock_acquire+0x548/0x3fb0 [ 932.064307][T25799] __handle_mm_fault+0x2d5e/0x3ec0 [ 932.064325][T25799] ? vmf_insert_mixed_mkwrite+0x40/0x40 [ 932.074285][T25799] ? find_held_lock+0x35/0x130 [ 932.074302][T25799] ? handle_mm_fault+0x322/0xb30 [ 932.074351][T25799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.074370][T25799] ? kasan_check_read+0x11/0x20 [ 932.074388][T25799] handle_mm_fault+0x43f/0xb30 [ 932.074409][T25799] __do_page_fault+0x5ef/0xda0 [ 932.178648][T25799] do_page_fault+0x71/0x581 [ 932.183169][T25799] page_fault+0x1e/0x30 [ 932.183194][T25799] RIP: 0010:copy_user_generic_unrolled+0x89/0xc0 [ 932.183211][T25799] Code: 38 4c 89 47 20 4c 89 4f 28 4c 89 57 30 4c 89 5f 38 48 8d 76 40 48 8d 7f 40 ff c9 75 b6 89 d1 83 e2 07 c1 e9 03 74 12 4c 8b 06 <4c> 89 07 48 8d 76 08 48 8d 7f 08 ff c9 75 ee 21 d2 74 10 89 d1 8a [ 932.183219][T25799] RSP: 0018:ffff88805d387bc8 EFLAGS: 00010202 [ 932.183231][T25799] RAX: ffffed1013018408 RBX: 0000000000000020 RCX: 0000000000000004 [ 932.183248][T25799] RDX: 0000000000000000 RSI: ffff8880980c2020 RDI: 0000000020d83f60 [ 932.193701][T25799] RBP: ffff88805d387c00 R08: 0000000000000000 R09: ffffed1013018408 [ 932.193710][T25799] R10: ffffed1013018407 R11: ffff8880980c203f R12: 0000000020d83f60 [ 932.193719][T25799] R13: ffff8880980c2020 R14: 0000000020d83f80 R15: 00007ffffffff000 [ 932.193753][T25799] ? _copy_to_user+0xf7/0x120 [ 932.193773][T25799] aio_read_events+0x3ac/0x880 [ 932.193799][T25799] read_events+0x2f4/0x360 [ 932.193818][T25799] ? aio_read_events+0x880/0x880 [ 932.277961][T25799] ? lock_downgrade+0x880/0x880 [ 932.277989][T25799] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.278005][T25799] ? finish_wait+0x260/0x260 [ 932.278030][T25799] ? clock_was_set_work+0x30/0x30 [ 932.278050][T25799] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 932.298721][T25799] do_io_getevents+0x10d/0x3a0 [ 932.298743][T25799] __x64_sys_io_getevents+0x195/0x2d0 [ 932.298762][T25799] ? __ia32_sys_io_cancel+0x5a0/0x5a0 [ 932.298777][T25799] ? do_syscall_64+0x26/0x610 [ 932.298793][T25799] ? lockdep_hardirqs_on+0x418/0x5d0 [ 932.298810][T25799] ? trace_hardirqs_on+0x67/0x230 [ 932.298829][T25799] do_syscall_64+0x103/0x610 [ 932.298850][T25799] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.345944][T25799] RIP: 0033:0x457f29 [ 932.349839][T25799] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 932.369440][T25799] RSP: 002b:00007f74c1156c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000d0 [ 932.377848][T25799] RAX: ffffffffffffffda RBX: 00007f74c1156c90 RCX: 0000000000457f29 [ 932.385814][T25799] RDX: 0000000000000002 RSI: 0000000000000002 RDI: 00007f74c1136000 00:41:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x1000000}) 00:41:18 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x67211c00) [ 932.393777][T25799] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 932.401745][T25799] R10: 0000000020d83f60 R11: 0000000000000246 R12: 00007f74c11576d4 [ 932.409712][T25799] R13: 00000000004bf10b R14: 00000000004d0a68 R15: 0000000000000003 [ 932.417719][T25939] CPU: 0 PID: 25939 Comm: syz-executor.2 Not tainted 5.0.0+ #16 [ 932.425357][T25939] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 932.435416][T25939] Call Trace: [ 932.438755][T25939] dump_stack+0x172/0x1f0 [ 932.443104][T25939] should_fail.cold+0xa/0x15 [ 932.447703][T25939] ? __netlink_lookup+0x3c8/0x7a0 [ 932.452735][T25939] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 932.452759][T25939] __should_failslab+0x121/0x190 [ 932.452777][T25939] should_failslab+0x9/0x14 [ 932.452792][T25939] kmem_cache_alloc+0x47/0x6f0 [ 932.452809][T25939] ? lock_acquire+0x16f/0x3f0 [ 932.452822][T25939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.452838][T25939] skb_clone+0x150/0x3b0 [ 932.452854][T25939] netlink_deliver_tap+0x95c/0xc00 [ 932.452874][T25939] netlink_unicast+0x5a7/0x720 [ 932.452892][T25939] ? netlink_attachskb+0x770/0x770 [ 932.452905][T25939] ? _copy_from_iter_full+0x259/0x8f0 [ 932.452918][T25939] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 932.452931][T25939] ? __check_object_size+0x3d/0x42f [ 932.452950][T25939] netlink_sendmsg+0x8ae/0xd70 [ 932.452969][T25939] ? netlink_unicast+0x720/0x720 [ 932.452990][T25939] ? tomoyo_socket_sendmsg+0x26/0x30 [ 932.477612][T25939] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 932.477628][T25939] ? security_socket_sendmsg+0x93/0xc0 [ 932.477646][T25939] ? netlink_unicast+0x720/0x720 [ 932.493210][T25939] sock_sendmsg+0xdd/0x130 [ 932.493227][T25939] ___sys_sendmsg+0x806/0x930 [ 932.493244][T25939] ? copy_msghdr_from_user+0x430/0x430 [ 932.493267][T25939] ? kasan_check_read+0x11/0x20 [ 932.493289][T25939] ? __fget+0x381/0x550 [ 932.508471][T25939] ? ksys_dup3+0x3e0/0x3e0 [ 932.508484][T25939] ? lock_downgrade+0x880/0x880 [ 932.508505][T25939] ? __fget_light+0x1a9/0x230 [ 932.519393][T25939] ? __fdget+0x1b/0x20 [ 932.519407][T25939] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 932.519429][T25939] __sys_sendmsg+0x105/0x1d0 [ 932.534368][T25939] ? __ia32_sys_shutdown+0x80/0x80 [ 932.534397][T25939] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 932.534417][T25939] ? do_syscall_64+0x26/0x610 [ 932.546091][T25939] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.624670][T25939] ? do_syscall_64+0x26/0x610 [ 932.629375][T25939] __x64_sys_sendmsg+0x78/0xb0 [ 932.634148][T25939] do_syscall_64+0x103/0x610 [ 932.638746][T25939] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 932.644649][T25939] RIP: 0033:0x457f29 [ 932.648595][T25939] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 932.668199][T25939] RSP: 002b:00007f775f094c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 932.676614][T25939] RAX: ffffffffffffffda RBX: 00007f775f094c90 RCX: 0000000000457f29 [ 932.684579][T25939] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 00:41:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a000000) [ 932.692553][T25939] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 932.700518][T25939] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f775f0956d4 [ 932.708486][T25939] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000004 00:41:18 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000000)='/dev/amidi#\x00', 0x7, 0x1) io_submit(r0, 0x8, &(0x7f0000003680)=[&(0x7f0000000140)={0x0, 0x0, 0x0, 0x1, 0x4, r1, &(0x7f0000000340)="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", 0x1000, 0x72a, 0x0, 0x0, 0xffffffffffffff9c}, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2, 0x9, r1, &(0x7f0000000180)="dd1fe684d5a47d1d9a54a0832ae2921d0a2d2c2f7b2e8c7f64a318e1932f1447093a3ba8e201bf2b8ff50e3972f86255e6d40c76b629a54174a33dd69ce1bc41150f0db4c9bfbddfe2b5b01314b86c1ac93a59190e5a3c5e107964e448e7b731ee9f0366a5e059092f417ccf4ac5de5b34c8", 0x72, 0x5, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x4, r1, &(0x7f0000000240)="f6772320b88e80c0a61f51e4a224fcc54919b715f8db32e9aa409047dc0ca7c4dd8202a4a712694f14fdcb43c6b2bd5ffe97bb8442ae2cd154c592ad15d8e14989712cec822d14a65efe4265aebb43c2ddcd22a99edf7df7e27dd0e0e6ac24144aaec9b4c78286c18e7be79b6fb7", 0x6e, 0x100020000, 0x0, 0x2, 0xffffffffffffff9c}, &(0x7f0000002340)={0x0, 0x0, 0x0, 0x0, 0x8, r1, &(0x7f0000001340)="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", 0x1000, 0x401, 0x0, 0x1, r1}, &(0x7f00000023c0)={0x0, 0x0, 0x0, 0x0, 0x6, r1, &(0x7f0000002380)="c5e7df0d3a9c0d49bb3278789069c7710664a0b9869003189fdda466a0e3b4d13bb1bf1f47dae74c92f2327b11dea75538", 0x31, 0xffffffffffffffff, 0x0, 0x2, r1}, &(0x7f0000002500)={0x0, 0x0, 0x0, 0x0, 0x100, r1, &(0x7f0000002400)="a0a3ed327679590ef0d1d242d505449276b5a2039a9d24fdde561b1eace2c5953fd1ec49ca1b9f00d92005ef26154f1303b69f6a5b5d19bb748f1ff254217c660dc467e26f27002c5a84ee8b0b90fdd4ccf89b1ea38aec271c4fab3f758549ad71165d7247e13950c0c90c7ca7d7328b2c71d08b157badf6f71561c6b17fca2b4ad2ce00d70a43c42b06a1515ec2b3e02f3e4ea7c3679ad26f60eed8796f40d630c7d19c506aeea80612d13ca76e20ad8331801e6e80109196bd123a5c616b55ea41ca83433e0fc3b0", 0xc9, 0x3f, 0x0, 0x2}, &(0x7f0000002600)={0x0, 0x0, 0x0, 0x5, 0x10001, r1, &(0x7f0000002540)="64709c09f974b3c968ea23a4846443f948761e9914e9fb21d4f54b34e670c8399b4bbd665dc706e68e6b73f68e8b5165314bfec830e18e543185782f2468727bcae25e33f349d5f705c4560d6e3050cf022c2cb9a34db723cb8b0309dc3165ea1b80b5500aa429e650b0e9f3879db6870747b9d5e9e2776b354e5889a72e601297f65fec0f5ed954bf60d0264f23ca988bcfce60", 0x94, 0x7f, 0x0, 0x0, r1}, &(0x7f0000003640)={0x0, 0x0, 0x0, 0xf, 0x1ff, r1, &(0x7f0000002640)="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", 0x1000, 0x0, 0x0, 0x3, r1}]) r2 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x2, 0x40) ioctl$VIDIOC_PREPARE_BUF(r1, 0xc058565d, &(0x7f00000000c0)={0x3, 0x0, 0x4, 0x20, {}, {0x4, 0x8, 0x8, 0x20, 0x1f, 0x8, "aa84e586"}, 0x0, 0x7, @planes=&(0x7f0000000080)={0x1, 0x5, @fd=r2, 0xffff}, 0x4}) r3 = add_key$user(&(0x7f0000003800)='user\x00', &(0x7f0000003840)={'syz', 0x0}, &(0x7f0000003880)="f6768ab0bfa2dd31153551e1c4fc085fc8796a3bff15bfe71d119ef5117715c04798b204f0b6cd3dc24a7b8ded77f2", 0x2f, 0xfffffffffffffffb) keyctl$update(0x2, r3, &(0x7f00000038c0)="7cc418e60a3f50b60be78a0e8aad266df2f7e9bc5e11b3e74188caf9f0", 0x1d) r4 = mmap$binder(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x8010, r2, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000003780)={0x10, 0x0, &(0x7f00000036c0)=[@free_buffer={0x40086303, r4}, @exit_looper], 0x59, 0x0, &(0x7f0000003700)="315e601b74a70a7193730d28f2372f7b46597587d5cdf954091e3cfe1fadd4a19e5e41d6aba9740c4541ef6116460e888e971d66a1e5edae8784b013dd024c15164dbf3aa3d572bf7f2904f546b6b7fff2126002a8eb90b16b"}) io_destroy(r0) write$FUSE_NOTIFY_INVAL_INODE(r2, &(0x7f0000003900)={0x28, 0x2, 0x0, {0x5, 0x5, 0xfffffffffffffff9}}, 0x28) syz_open_dev$dspn(&(0x7f00000037c0)='/dev/dsp#\x00', 0x6, 0x4000) [ 932.751140][T25939] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:18 executing program 4 (fault-call:1 fault-nth:3): io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a51edba) 00:41:18 executing program 2 (fault-call:1 fault-nth:3): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:18 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x68000000) 00:41:18 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7b080c57) 00:41:18 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xfdfdffff}) [ 932.972810][T26248] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 932.998439][T26248] FAULT_INJECTION: forcing a failure. [ 932.998439][T26248] name failslab, interval 1, probability 0, space 0, times 0 00:41:19 executing program 5: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100)='/dev/snapshot\x00', 0x100, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000140)='/dev/snd/pcmC#D#c\x00', 0x821, 0x452200) ioctl$VHOST_SET_VRING_KICK(r0, 0x4008af20, &(0x7f0000000180)={0x3, r1}) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r2, 0x2, 0x2, &(0x7f0000000000)=[{}, {}], 0x0) r3 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x10000, 0x0) ioctl$VIDIOC_G_MODULATOR(r3, 0xc0445636, &(0x7f0000000080)={0x9, "c9b48e6c85f1ba97d182fa3077f80569baeb6b8ef2f4bca5c4e4682475ab209b", 0x400, 0xe8, 0x8, 0x4, 0x7}) io_destroy(r2) [ 933.080713][T26248] CPU: 0 PID: 26248 Comm: syz-executor.2 Not tainted 5.0.0+ #16 [ 933.088382][T26248] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.098430][T26248] Call Trace: [ 933.101744][T26248] dump_stack+0x172/0x1f0 [ 933.106102][T26248] should_fail.cold+0xa/0x15 [ 933.110753][T26248] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 933.116563][T26248] ? ___might_sleep+0x163/0x280 [ 933.116584][T26248] __should_failslab+0x121/0x190 [ 933.116603][T26248] should_failslab+0x9/0x14 [ 933.116620][T26248] kmem_cache_alloc_node+0x264/0x710 [ 933.116651][T26248] __alloc_skb+0xd5/0x5e0 [ 933.126423][T26248] ? skb_trim+0x190/0x190 [ 933.126438][T26248] ? kasan_check_read+0x11/0x20 [ 933.126542][T26248] ? ip6_sk_redirect+0x130/0x130 [ 933.126563][T26248] netlink_ack+0x25c/0xb50 [ 933.159171][T26248] ? netlink_sendmsg+0xd70/0xd70 [ 933.164124][T26248] ? netlink_deliver_tap+0x22d/0xc00 [ 933.169424][T26248] ? find_held_lock+0x35/0x130 [ 933.174192][T26248] netlink_rcv_skb+0x379/0x460 00:41:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6a23c7e5) [ 933.179008][T26248] ? rtnetlink_put_metrics+0x560/0x560 [ 933.184468][T26248] ? netlink_ack+0xb50/0xb50 [ 933.189057][T26248] ? kasan_check_read+0x11/0x20 [ 933.193912][T26248] ? netlink_deliver_tap+0x254/0xc00 [ 933.193932][T26248] rtnetlink_rcv+0x1d/0x30 [ 933.193946][T26248] netlink_unicast+0x536/0x720 [ 933.193963][T26248] ? netlink_attachskb+0x770/0x770 [ 933.193974][T26248] ? _copy_from_iter_full+0x259/0x8f0 [ 933.193988][T26248] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 933.194001][T26248] ? __check_object_size+0x3d/0x42f [ 933.194019][T26248] netlink_sendmsg+0x8ae/0xd70 [ 933.194038][T26248] ? netlink_unicast+0x720/0x720 [ 933.194059][T26248] ? tomoyo_socket_sendmsg+0x26/0x30 [ 933.208479][T26248] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 933.208494][T26248] ? security_socket_sendmsg+0x93/0xc0 [ 933.208508][T26248] ? netlink_unicast+0x720/0x720 [ 933.208524][T26248] sock_sendmsg+0xdd/0x130 [ 933.208540][T26248] ___sys_sendmsg+0x806/0x930 [ 933.208563][T26248] ? copy_msghdr_from_user+0x430/0x430 [ 933.275914][T26248] ? kasan_check_read+0x11/0x20 00:41:19 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 933.280772][T26248] ? __fget+0x381/0x550 [ 933.284937][T26248] ? ksys_dup3+0x3e0/0x3e0 [ 933.289365][T26248] ? lock_downgrade+0x880/0x880 [ 933.294224][T26248] ? __fget_light+0x1a9/0x230 [ 933.294241][T26248] ? __fdget+0x1b/0x20 [ 933.294256][T26248] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 933.294273][T26248] __sys_sendmsg+0x105/0x1d0 [ 933.294306][T26248] ? __ia32_sys_shutdown+0x80/0x80 [ 933.294333][T26248] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 933.294364][T26248] ? do_syscall_64+0x26/0x610 [ 933.294379][T26248] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.294404][T26248] ? do_syscall_64+0x26/0x610 [ 933.294426][T26248] __x64_sys_sendmsg+0x78/0xb0 [ 933.303170][T26248] do_syscall_64+0x103/0x610 [ 933.303187][T26248] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.303198][T26248] RIP: 0033:0x457f29 [ 933.303212][T26248] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:41:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7c10ae85) 00:41:19 executing program 2 (fault-call:1 fault-nth:4): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 933.303220][T26248] RSP: 002b:00007f775f094c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 933.303235][T26248] RAX: ffffffffffffffda RBX: 00007f775f094c90 RCX: 0000000000457f29 [ 933.303243][T26248] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 933.303251][T26248] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 933.303259][T26248] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f775f0956d4 [ 933.303267][T26248] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000004 00:41:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7c47fb4f) 00:41:19 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xffff8000}) 00:41:19 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6c000000) 00:41:19 executing program 5: syz_mount_image$bfs(&(0x7f00000000c0)='bfs\x00', &(0x7f0000000040)='./file0\x00', 0x80000004, 0x1, &(0x7f0000000080)=[{&(0x7f0000000180)="cefaad1bb83c000000dc4acf", 0xc}], 0x0, 0x0) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) mount$9p_virtio(&(0x7f0000000000)='F\x00', &(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='9p\x00', 0x81400, &(0x7f00000001c0)={'trans=virtio,', {[{@version_L='version=9p2000.L'}, {@version_L='version=9p2000.L'}, {@posixacl='posixacl'}, {@version_u='version=9p2000.u'}], [{@dont_hash='dont_hash'}, {@fsmagic={'fsmagic', 0x3d, 0x2}}, {@fsmagic={'fsmagic', 0x3d, 0x6}}]}}) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000280)='/dev/snd/pcmC#D#c\x00', 0x3ff, 0xc2200) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'vlan0\x00', 0x0}) r3 = getuid() setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in=@rand_addr=0x2, 0x4e24, 0x6, 0x4e23, 0x8, 0xa, 0x0, 0xa0, 0x77, r2, r3}, {0x401, 0x4, 0x3f, 0x7, 0x2, 0xffffffff, 0x47, 0x5}, {0x80, 0xfff, 0xa9, 0xfff}, 0x3, 0x6e6bb3, 0x0, 0x1, 0x0, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x16}, 0x4d4, 0x6f}, 0x0, @in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x3507, 0x4, 0x0, 0x5, 0x0, 0xe8, 0x9}}, 0xe8) io_destroy(r0) [ 933.589861][T26584] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 933.634144][T26584] FAULT_INJECTION: forcing a failure. [ 933.634144][T26584] name failslab, interval 1, probability 0, space 0, times 0 [ 933.658259][T26586] BFS-fs: bfs_fill_super(): loop5 is unclean, continuing [ 933.659000][T26584] CPU: 1 PID: 26584 Comm: syz-executor.2 Not tainted 5.0.0+ #16 [ 933.673141][T26584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 933.673147][T26584] Call Trace: [ 933.673168][T26584] dump_stack+0x172/0x1f0 [ 933.673197][T26584] should_fail.cold+0xa/0x15 [ 933.673217][T26584] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 933.701264][T26584] ? ___might_sleep+0x163/0x280 [ 933.701283][T26584] __should_failslab+0x121/0x190 [ 933.701301][T26584] should_failslab+0x9/0x14 [ 933.701317][T26584] kmem_cache_alloc_node_trace+0x270/0x720 [ 933.701340][T26584] __kmalloc_node_track_caller+0x3d/0x70 [ 933.711114][T26584] __kmalloc_reserve.isra.0+0x40/0xf0 [ 933.711133][T26584] __alloc_skb+0x10b/0x5e0 [ 933.711149][T26584] ? skb_trim+0x190/0x190 [ 933.711162][T26584] ? kasan_check_read+0x11/0x20 [ 933.711180][T26584] ? ip6_sk_redirect+0x130/0x130 [ 933.711207][T26584] netlink_ack+0x25c/0xb50 [ 933.721494][T26584] ? netlink_sendmsg+0xd70/0xd70 [ 933.721509][T26584] ? netlink_deliver_tap+0x22d/0xc00 [ 933.721523][T26584] ? find_held_lock+0x35/0x130 [ 933.721553][T26584] netlink_rcv_skb+0x379/0x460 [ 933.721569][T26584] ? rtnetlink_put_metrics+0x560/0x560 [ 933.721584][T26584] ? netlink_ack+0xb50/0xb50 [ 933.721598][T26584] ? kasan_check_read+0x11/0x20 [ 933.721616][T26584] ? netlink_deliver_tap+0x254/0xc00 [ 933.732626][T26584] rtnetlink_rcv+0x1d/0x30 [ 933.732641][T26584] netlink_unicast+0x536/0x720 [ 933.732659][T26584] ? netlink_attachskb+0x770/0x770 [ 933.741400][T26584] ? _copy_from_iter_full+0x259/0x8f0 [ 933.741414][T26584] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 933.741426][T26584] ? __check_object_size+0x3d/0x42f [ 933.741444][T26584] netlink_sendmsg+0x8ae/0xd70 [ 933.741463][T26584] ? netlink_unicast+0x720/0x720 [ 933.747622][T26586] BFS-fs: bfs_fill_super(): Last block not available on loop5: 6792557 [ 933.751264][T26584] ? tomoyo_socket_sendmsg+0x26/0x30 [ 933.751281][T26584] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 933.751297][T26584] ? security_socket_sendmsg+0x93/0xc0 [ 933.751311][T26584] ? netlink_unicast+0x720/0x720 [ 933.751332][T26584] sock_sendmsg+0xdd/0x130 [ 933.826099][T26584] ___sys_sendmsg+0x806/0x930 [ 933.826118][T26584] ? copy_msghdr_from_user+0x430/0x430 00:41:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7d689f96) 00:41:19 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x4, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 933.826142][T26584] ? kasan_check_read+0x11/0x20 [ 933.826172][T26584] ? __fget+0x381/0x550 [ 933.826198][T26584] ? ksys_dup3+0x3e0/0x3e0 [ 933.835854][T26584] ? lock_downgrade+0x880/0x880 [ 933.835875][T26584] ? __fget_light+0x1a9/0x230 [ 933.835889][T26584] ? __fdget+0x1b/0x20 [ 933.835901][T26584] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 933.835917][T26584] __sys_sendmsg+0x105/0x1d0 [ 933.835933][T26584] ? __ia32_sys_shutdown+0x80/0x80 [ 933.861226][T26584] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 933.870597][T26584] ? do_syscall_64+0x26/0x610 00:41:19 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7d88f6d1) [ 933.870613][T26584] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.870626][T26584] ? do_syscall_64+0x26/0x610 [ 933.870644][T26584] __x64_sys_sendmsg+0x78/0xb0 [ 933.870660][T26584] do_syscall_64+0x103/0x610 [ 933.870687][T26584] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 933.870707][T26584] RIP: 0033:0x457f29 [ 933.963587][T26584] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00:41:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xfffffdfd}) [ 933.983222][T26584] RSP: 002b:00007f775f094c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 933.991636][T26584] RAX: ffffffffffffffda RBX: 00007f775f094c90 RCX: 0000000000457f29 [ 933.999594][T26584] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 934.007543][T26584] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 934.015489][T26584] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f775f0956d4 [ 934.023435][T26584] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000004 00:41:20 executing program 2 (fault-call:1 fault-nth:5): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x6d17f90d) 00:41:20 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x7d, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:20 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x0, 0x0) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000340)={0x7, {{0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}}, 0x0, 0x7, [{{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e22, @loopback}}, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x15}}}, {{0x2, 0x4e20, @local}}, {{0x2, 0x4e24, @empty}}, {{0x2, 0x4e23, @empty}}, {{0x2, 0x4e21, @broadcast}}]}, 0x410) [ 934.202090][T26808] netlink: 'syz-executor.2': attribute type 3 has an invalid length. [ 934.236176][T26808] FAULT_INJECTION: forcing a failure. [ 934.236176][T26808] name failslab, interval 1, probability 0, space 0, times 0 [ 934.267812][T26808] CPU: 0 PID: 26808 Comm: syz-executor.2 Not tainted 5.0.0+ #16 [ 934.275445][T26808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 934.285493][T26808] Call Trace: [ 934.288802][T26808] dump_stack+0x172/0x1f0 [ 934.293167][T26808] should_fail.cold+0xa/0x15 [ 934.297804][T26808] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 934.303651][T26808] __should_failslab+0x121/0x190 [ 934.308609][T26808] should_failslab+0x9/0x14 [ 934.313114][T26808] kmem_cache_alloc+0x47/0x6f0 [ 934.317887][T26808] ? lock_acquire+0x16f/0x3f0 [ 934.322609][T26808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 934.329021][T26808] skb_clone+0x150/0x3b0 [ 934.333280][T26808] netlink_deliver_tap+0x95c/0xc00 [ 934.338430][T26808] __netlink_sendskb+0x63/0xd0 [ 934.343196][T26808] netlink_unicast+0x60f/0x720 [ 934.347970][T26808] ? netlink_attachskb+0x770/0x770 [ 934.353093][T26808] netlink_ack+0x607/0xb50 [ 934.357523][T26808] ? netlink_sendmsg+0xd70/0xd70 [ 934.357536][T26808] ? netlink_deliver_tap+0x22d/0xc00 [ 934.357556][T26808] ? find_held_lock+0x35/0x130 [ 934.357573][T26808] netlink_rcv_skb+0x379/0x460 [ 934.357594][T26808] ? rtnetlink_put_metrics+0x560/0x560 [ 934.382769][T26808] ? netlink_ack+0xb50/0xb50 [ 934.382785][T26808] ? kasan_check_read+0x11/0x20 [ 934.382802][T26808] ? netlink_deliver_tap+0x254/0xc00 [ 934.382820][T26808] rtnetlink_rcv+0x1d/0x30 [ 934.382833][T26808] netlink_unicast+0x536/0x720 [ 934.382849][T26808] ? netlink_attachskb+0x770/0x770 [ 934.382861][T26808] ? _copy_from_iter_full+0x259/0x8f0 [ 934.382874][T26808] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 934.382887][T26808] ? __check_object_size+0x3d/0x42f [ 934.382904][T26808] netlink_sendmsg+0x8ae/0xd70 [ 934.382922][T26808] ? netlink_unicast+0x720/0x720 [ 934.432860][T26808] ? tomoyo_socket_sendmsg+0x26/0x30 [ 934.432878][T26808] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 934.432895][T26808] ? security_socket_sendmsg+0x93/0xc0 [ 934.432915][T26808] ? netlink_unicast+0x720/0x720 [ 934.443119][T26808] sock_sendmsg+0xdd/0x130 [ 934.443138][T26808] ___sys_sendmsg+0x806/0x930 00:41:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x736408ff) [ 934.443158][T26808] ? copy_msghdr_from_user+0x430/0x430 [ 934.443184][T26808] ? kasan_check_read+0x11/0x20 [ 934.443204][T26808] ? __fget+0x381/0x550 [ 934.443225][T26808] ? ksys_dup3+0x3e0/0x3e0 [ 934.443239][T26808] ? lock_downgrade+0x880/0x880 [ 934.443266][T26808] ? __fget_light+0x1a9/0x230 [ 934.497296][T26808] ? __fdget+0x1b/0x20 [ 934.501362][T26808] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 934.507599][T26808] __sys_sendmsg+0x105/0x1d0 [ 934.512189][T26808] ? __ia32_sys_shutdown+0x80/0x80 00:41:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x73746174) [ 934.517324][T26808] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 934.522806][T26808] ? do_syscall_64+0x26/0x610 [ 934.527482][T26808] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.533577][T26808] ? do_syscall_64+0x26/0x610 [ 934.538255][T26808] __x64_sys_sendmsg+0x78/0xb0 [ 934.543030][T26808] do_syscall_64+0x103/0x610 [ 934.547627][T26808] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 934.553514][T26808] RIP: 0033:0x457f29 [ 934.557419][T26808] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 934.577538][T26808] RSP: 002b:00007f775f094c78 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 934.585949][T26808] RAX: ffffffffffffffda RBX: 00007f775f094c90 RCX: 0000000000457f29 [ 934.593918][T26808] RDX: 0000000000000000 RSI: 0000000020000080 RDI: 0000000000000003 [ 934.601887][T26808] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 934.609857][T26808] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f775f0956d4 00:41:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8109bbbd) 00:41:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x1000000000000}) [ 934.617857][T26808] R13: 00000000004c5561 R14: 00000000004d9408 R15: 0000000000000004 00:41:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x81b1f603) 00:41:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x74000000) 00:41:20 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x80ffff00000000}) 00:41:20 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x82496613) 00:41:20 executing program 2 (fault-call:1 fault-nth:6): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:20 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x742909a6) 00:41:20 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x106, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:20 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8422cade) 00:41:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x100000000000000}) [ 935.076053][T27575] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:21 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xfffffffffffffe00, 0x10000) getpeername$packet(r1, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) io_destroy(r0) 00:41:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x74617473) 00:41:21 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x603, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x84553ad3) [ 935.256049][T27669] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x2, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:21 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x3f, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = socket$packet(0x11, 0x3, 0x300) fremovexattr(r1, &(0x7f0000000000)=ANY=[@ANYBLOB="6f734f2e7365637572696c792900cef9c48f45ac45021208d6e72b2458"]) io_destroy(r0) stat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) 00:41:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0xfdfdffff00000000}) 00:41:21 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x4, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x84719294) 00:41:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x75730042) [ 935.524163][T27895] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x84a3f4f9) [ 935.570239][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 935.576136][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:41:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x3, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:21 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x7d, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:21 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = syz_open_dev$cec(&(0x7f0000000000)='/dev/cec#\x00', 0x0, 0x2) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000040)={0x9, 0x0, 0x1, 0x1}) ioctl$DRM_IOCTL_SG_FREE(r1, 0x40106439, &(0x7f0000000080)={0x57, r2}) 00:41:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x85328bf3) 00:41:21 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x75e42b2b) 00:41:21 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x80ffff}) 00:41:21 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x4, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:21 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x85714ce3) 00:41:21 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x106, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 935.953332][T28215] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:22 executing program 5: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000000)='/dev/vfio/vfio\x00', 0x240200, 0x0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x6}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f00000000c0)={r1, 0x5b6}, &(0x7f0000000100)=0x8) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r0, 0x84, 0x73, &(0x7f0000000140)={r2, 0x80000000, 0x30, 0x5, 0x8}, &(0x7f0000000180)=0x18) io_destroy(r3) io_getevents(r3, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r3) 00:41:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x5, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7770c98b) 00:41:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x85ae107c) 00:41:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x1000000}) [ 936.119780][T28350] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:22 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x603, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:22 executing program 5: syz_mount_image$btrfs(&(0x7f0000000000)='btrfs\x00', &(0x7f0000000040)='./file0\x00', 0x3, 0x5, &(0x7f0000001440)=[{&(0x7f0000000080)="5d4d6fef6586ee6a52c10eb230705ab089d568c4b2141fcec3b7c7bbde5a6fc6fc02b649f030b5d8752b68fecad12d56a72100c3d55ea4dffbf722ffdf2ccb073f4d53677ca82a53eeb6e4e933cda27a8f92be6e61f81153dfb450ab2345649d986a4d0afd95e34f74499c747374a7611a37f823a3cc1ea955aed65cc71695328eec4a35f5e61c37bc970556d1b92bb54a09cb7d9877ea29ae6c3445866390ddaac20f01fd8fa0f7e4d4874d9315e1298be5af5779d4937cfffbcc65dd36d91c65d3d7ff4f49d5a53c01a17f72", 0xcd, 0xfffffffffffffff8}, {&(0x7f0000000180)="2be875ae8c14a64fe0a8ab18ad55fb63be9ab2bbcf92f448c25b981af04f166f6f6a83cba9a12f042336e05632b4a22216981279136052232a72d9c459f861b336505b99917fb47c7c8fad5fa721091d8238b0cd78d4951419c1a1ac4b1348761a1368b750e9932ab9933ad99d80f46b26dbd39992b1d89a6f027ce96e2cb86ceb47e83eccaed2bb3347a0743d22041ba7fa235cb6f002c3da2c133515ae5f02e3bf065c1cdeeffca53d", 0xaa, 0x16c}, {&(0x7f0000000240)="896750ec8411204840c1dc66b7a2d57efe0f02ab32dd6b093312b6ad00adccc3ff23313d5ddd6c0883543a19da0eae8b6006c1848a2faaecaeabb9984cacf0a3e93f8e3f255181291c02825bedb6e240cb41252f5064a54a72c2c7a480b73ed2d597a9cba91f2c12c3ff0814c337f32cb728680ef2336f42b05a17b7316edbe92253f58db6e7ac73736f19705e72854399be4e6a374b63a3937886581aae0122a5056ce9831c", 0xa6, 0x9}, {&(0x7f0000000340)="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", 0x1000, 0x662b}, {&(0x7f0000001340)="91e424bc72302c52760dea13e9f27969f247cd94c89e2792d3bdc47a5dac2f51503011a77bf8b0a86e06b181fad0aa8649661744c0757bc9294b161ae51399e0a832cd5fdba344adbe4a6f49b64ab739262667e09a606b51feee9d0093cb22950b4669f5a7d6dfc71955e9c580268c36cd1bca72d94ebb71e51c06cd8372ace2114c409da39625c501dfa3154e2afdf0f41d84dda7e980962b750197cea600ed1cdc200642913fa7aa99ff3db11ecd1c67f10865b7c13b1902b43fb861c71578b94a63799d655faf14975551a1fbbc797a0575c401c7482ff8516edd07a3cfb182bfc530f6a4331a0826665f54720dada389f739bc02935e", 0xf8, 0x6}], 0x220000, &(0x7f00000014c0)={[{@datacow='datacow'}, {@fragment_all='fragment=all'}, {@ref_verify='ref_verify'}, {@nossd_spread='nossd_spread'}, {@compress_force='compress-force'}, {@nossd_spread='nossd_spread'}, {@user_subvol_rm='user_subvol_rm_allowed'}]}) io_setup(0x80000000008003, &(0x7f0000001680)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f00000015c0)='/dev/zero\x00', 0x4600, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000300)={0x9, 0x3}) ioctl$KVM_GET_XCRS(r1, 0x8188aea6, &(0x7f0000001540)={0x2, 0xff, [{0xffffffffffffffc1, 0x0, 0x1f}, {0xfffffffffffff206, 0x0, 0x2}]}) [ 936.212337][T28350] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x862360d8) 00:41:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0xfdfdffff}) 00:41:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x78238b50) 00:41:22 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @broadcast}, &(0x7f0000000040)=0x10, 0x80800) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f00000000c0)={0x1ff, 0x5ae9, 0x6, 0xc0ac, 0x0, 0x10001, 0x20, 0x8, 0x4, 0x1, 0xff}, 0xb) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) socket$can_bcm(0x1d, 0x2, 0x2) io_destroy(r0) 00:41:22 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x800, 0x400) ioctl$SG_GET_TIMEOUT(r1, 0x2202, 0x0) io_destroy(r0) 00:41:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x7, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8bc97077) 00:41:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8d405e5b) 00:41:22 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x785e91ea) 00:41:22 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0xffff8000}) 00:41:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x8, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:22 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) umount2(&(0x7f0000000000)='./file0\x00', 0x4) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:22 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sync_file_range(r1, 0x1, 0x9, 0x6) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:22 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8d5d0548) 00:41:22 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xa, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7973e60c) 00:41:23 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$netrom_NETROM_T1(r1, 0x103, 0x1, &(0x7f0000000040), &(0x7f0000000080)=0x4) 00:41:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8e1c7343) 00:41:23 executing program 4: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x0, &(0x7f0000000080)) io_destroy(0x0) 00:41:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0xfffffdfd}) 00:41:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xc, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:23 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000100)='/dev/sequencer\x00', 0x2002, 0x0) setsockopt$l2tp_PPPOL2TP_SO_LNSMODE(r1, 0x111, 0x4, 0x1, 0x4) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) socket$l2tp(0x18, 0x1, 0x1) sysfs$3(0x3) r3 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x0, 0x0) ioctl$sock_bt_cmtp_CMTPGETCONNLIST(r3, 0x800443d2, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{}, {}]}) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_destroy(r0) 00:41:23 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = socket$inet_smc(0x2b, 0x1, 0x0) connect$inet(r1, &(0x7f0000000340)={0x2, 0x4e22, @multicast2}, 0x10) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r2 = syz_init_net_socket$rose(0xb, 0x5, 0x0) r3 = syz_open_dev$midi(&(0x7f0000000240)='/dev/midi#\x00', 0x5, 0x4040) ioctl$SIOCNRDECOBS(r3, 0x89e2) dup(r2) connect$rose(r3, &(0x7f0000000480)=@full={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x0, [@bcast, @null, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @bcast, @null]}, 0x40) r4 = syz_open_dev$swradio(&(0x7f0000000000)='/dev/swradio#\x00', 0x1, 0x2) write$UHID_INPUT2(r4, &(0x7f0000000040)={0xc, 0x9a, "181297831d4bc073da7e5c08995df49f46e92517598cfb29fddabaecd3abc804850a00fe70333e23db082ad686ef55fd07476e39956098b3e17b920b4f3be5b0a82262450302f26cdd3f9892435d01bcdb78ca947b0a58b1d4af9114bb56f856dc604bade6711fe3a696c11018044a6919d178cd9679d7808d139bdcfa20bf62171906eeab02a47ae57b6c637e4311ad7d91129c7558ba99df9c"}, 0xa0) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_DEL_DAEMON(r4, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x80000400}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x3c, r5, 0x200, 0x70bd29, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP6={0x14, 0x6, @loopback}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x41) io_destroy(r0) ioctl$sock_bt_hidp_HIDPGETCONNLIST(r4, 0x800448d2, &(0x7f0000000440)={0x3, &(0x7f00000004c0)=[{}, {}, {}]}) r6 = dup2(r3, r4) setsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000680)={0x80000000, 0x9, 0x100000001, 0x100000001}, 0x14) ioctl$KDSKBSENT(r4, 0x4b49, &(0x7f0000000380)="a8c3c204a0a9c2b84bf213c8c2c722638272b29b69c360104e8678370401916dd643ef4ca93222860c7f038d404ea4abc1f7cc431bd63779e9db7b277df0938c021d9be829b33d0ed018a4b04ac2e3c1c3b226bf579f2290b547e6bbbd8b92c8662f7cdc3d60266d53326432b67ae6ba67a0cb0effd638b660d78bdbc087ff2fef9b741ca36424dc7f5759a0845a3cc79a70119d4d69ff07031723cb8878c7c800e2b25c38d3a70d8d24a972b48746054528929ccc") ioctl$VHOST_SET_LOG_BASE(r4, 0x4008af04, &(0x7f0000000280)=&(0x7f00000002c0)) 00:41:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8e3d93d4) 00:41:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xe, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x797a862a) 00:41:23 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x1, 0x80000) ioctl$UI_SET_PROPBIT(r1, 0x4004556e, 0x1d) r2 = memfd_create(&(0x7f0000000340)='-trustedvboxnet0selinuxeth0\x00', 0x2000000) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_destroy(r0) 00:41:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x1000000000000}) 00:41:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8fbb835e) 00:41:23 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x79966094) 00:41:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8fe45f0b) 00:41:23 executing program 4: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) io_setup(0x9, &(0x7f00000000c0)=0x0) io_destroy(r1) 00:41:23 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_destroy(r0) 00:41:23 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:23 executing program 4: io_getevents(0x0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r0 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) r1 = accept$inet(0xffffffffffffff9c, &(0x7f0000000100)={0x2, 0x0, @broadcast}, &(0x7f0000000140)=0x10) setsockopt$inet_sctp_SCTP_AUTOCLOSE(r1, 0x84, 0x4, &(0x7f0000000180)=0xfffffffffffffff9, 0x4) io_submit(0x0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) r2 = syz_open_dev$vbi(&(0x7f0000000000)='/dev/vbi#\x00', 0x3, 0x2) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) mq_notify(r2, &(0x7f00000000c0)={0x0, 0x3d, 0x4, @tid=r3}) io_destroy(0x0) [ 937.873202][T29477] validate_nla: 7 callbacks suppressed [ 937.873211][T29477] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:23 executing program 5: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x31d9, 0x4000c0) fcntl$setpipe(r1, 0x407, 0x8) 00:41:23 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x80ffff00000000}) 00:41:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9040d1bd) 00:41:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x48, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:24 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x5}]) io_destroy(r0) 00:41:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a000000) [ 938.133709][T29656] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9142a440) 00:41:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x4c, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:24 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_setup(0x0, &(0x7f0000000000)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000000040)=[{}, {}], 0x0) io_destroy(r0) 00:41:24 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x20) mq_timedsend(r2, &(0x7f00000000c0)="f293c109fda8539599f6098ab77aecddae1df05babb4f8a966d8fb71741a78b4c256e7cfd71a74a19c8a088065401c7c9348222447475472f2c1a8f4376c81d4a145ac33e5880a0aaaea3a462d57077e12c4d4b34cebb3800810286a71abd654e6966b1a2ec6d97f8ba2885facb5bbb08dfcdb", 0x73, 0xdbe0, &(0x7f0000000040)={0x77359400}) 00:41:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7a51edba) 00:41:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x100000000000000}) [ 938.315646][T29825] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x91eed530) 00:41:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x60, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:24 executing program 5: io_setup(0xffffffffffbfff6b, &(0x7f00000000c0)=0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0xc3a, 0x1) ioctl$DRM_IOCTL_MODE_GETCRTC(r1, 0xc06864a1, &(0x7f0000000140)={&(0x7f0000000100)=[0x3fe0000000], 0x1, 0x3f, 0xffff, 0x1, 0x2, 0x3f, {0xe14, 0x1000, 0x0, 0x2, 0x5, 0xa03e, 0x101, 0x8, 0xfff, 0x1, 0xd3, 0x2, 0x6, 0x7, "5284dede6fc51a23960cf25e462024c921d381c7f3a4dc368548c79405f71a48"}}) io_getevents(r0, 0xfffffffffffffffe, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x80001, 0x0) syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x6ffff) 00:41:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x92e8ec0d) [ 938.528277][T29903] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:24 executing program 4: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0x8, 0x20000) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(r0, 0x40405515, &(0x7f0000000080)={0x6, 0x7, 0xfd43, 0x2, 'syz0\x00', 0xfe8}) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r1, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r1, 0x1, &(0x7f0000000000)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x7fff}]) io_destroy(r1) 00:41:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7b080c57) 00:41:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x68, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0xfdfdffff00000000}) 00:41:24 executing program 5: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x420c0, 0x0) mkdirat$cgroup(r0, &(0x7f0000000080)='syz0\x00', 0x1ff) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r1, 0x2, 0x8000000000000ea, &(0x7f0000000000)=[{}, {}], 0x0) ioctl$KVM_ENABLE_CAP_CPU(r0, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0xc545, 0x6, 0x2, 0x6613]}) io_destroy(r1) 00:41:24 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x93907658) [ 938.819554][T30067] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:24 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r2, 0xc08c5332, &(0x7f0000000140)={0x0, 0x2d0, 0x2, 'queue1\x00', 0x2}) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) sendto$ax25(r1, &(0x7f0000000000)="a44bd6c66e", 0x5, 0x4, &(0x7f00000000c0)={{0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, [@null, @default, @bcast, @bcast, @bcast, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}]}, 0x48) 00:41:24 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7c10ae85) 00:41:24 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6c, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x80ffff]}) 00:41:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x943ec8ef) 00:41:25 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x8000, 0x0) r2 = socket$caif_seqpacket(0x25, 0x5, 0x5) ioctl$sock_bt_bnep_BNEPCONNADD(r1, 0x400442c8, &(0x7f0000000480)=ANY=[@ANYRES32=r2, @ANYBLOB="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"]) r3 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x200000, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r3, &(0x7f0000000340)={0x9, 0x108, 0xfa00, {r4, 0x47, "44c1c0", "2b724805b09100ab3a687356c472a1159ec2e0e3b9b8ccfc8c0693a8679298d5633830024226cd39aabe112d4acc0a40509f881ee2e1274cbd249e7d388eba6663e613969edf8c01149d5f55f749d1e48be5d5e25f586113359d8cf3c4c8200099ef9537eb99a8fe788c0b7a770198001518e4591603da12054cd36a690a2140711e81768422737f1ad248ddd531eab7353e6a5f2a63e77061eee3c3f6b41e97a8ac3bc6464557002af379b35330da283b7b15a47596c3279f28fec42b474295172ba012be577a3d5691d54f508d9581da140cd889b19467c98e22f5cfd3a66cf60aff9a0c571e1b10338c658ebb2b93f6fd992c43ce24fc5744cf06858e17cc"}}, 0x110) io_destroy(r0) 00:41:25 executing program 4: io_setup(0x80001000000002, &(0x7f0000000300)=0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000000)='/dev/cachefiles\x00', 0x4000, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000040)='cdg\x00', 0x4) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_destroy(r0) [ 939.127569][T30290] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9447e4c0) 00:41:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7c47fb4f) 00:41:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x74, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x1000000]}) 00:41:25 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = syz_open_dev$media(&(0x7f0000000000)='/dev/media#\x00', 0x1, 0x0) openat$cgroup_subtree(r1, &(0x7f0000000040)='cgroup.subtree_control\x00', 0x2, 0x0) 00:41:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x94609679) 00:41:25 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) set_mempolicy(0x8000, &(0x7f0000000000)=0x5, 0x27) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) [ 939.441622][T30571] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7d689f96) 00:41:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x7a, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x94927184) 00:41:25 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000340)={0x8001}, 0x8) r2 = dup(r1) clock_gettime(0x0, &(0x7f00000003c0)={0x0, 0x0}) utimes(&(0x7f0000000380)='./file0\x00', &(0x7f0000000400)={{r3, r4/1000+10000}, {0x0, 0x7530}}) r5 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040)='IPVS\x00') sendmsg$IPVS_CMD_GET_INFO(r2, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa200000}, 0xc, &(0x7f0000000280)={&(0x7f0000000080)={0x1f0, r5, 0x300, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x40, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e22}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'lc\x00'}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@local}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x80}]}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e20}]}, @IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x80000000}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e20}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x9}]}, @IPVS_CMD_ATTR_DEST={0x4}, @IPVS_CMD_ATTR_DEST={0x48, 0x2, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x6}, @IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e24}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x8, 0xb, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x6}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x6}, @IPVS_DAEMON_ATTR_STATE={0x8}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e21}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}]}, @IPVS_CMD_ATTR_SERVICE={0x64, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x4}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x8f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr="af8c9f16a1d7c3912e4625b3cac13c5a"}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e23}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@multicast1}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'ovf\x00'}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x6a}, @IPVS_SVC_ATTR_PORT={0x8, 0x4, 0x4e21}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3f}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x5}, @IPVS_CMD_ATTR_SERVICE={0x70, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x84}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0xc, 0x1}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@empty}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@rand_addr=0x12000000}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}]}]}, 0x1f0}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) [ 939.665620][T30804] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:25 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vsock\x00', 0x2, 0x0) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x1) r1 = syz_open_dev$dmmidi(&(0x7f0000000000)='/dev/dmmidi#\x00', 0x5, 0x101002) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f00000000c0)=""/150) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r2, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r3 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r2, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0}]) io_destroy(r2) 00:41:25 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x7d88f6d1) 00:41:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf0, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:25 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0xfdfdffff]}) 00:41:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x969f687d) [ 939.860839][T30839] Unknown ioctl 1074029061 [ 939.868808][T30847] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:25 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x300, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:25 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x99b72f0e) 00:41:26 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$DRM_IOCTL_PRIME_HANDLE_TO_FD(0xffffffffffffff9c, 0xc00c642d, &(0x7f0000000000)={0x0, 0x80000, 0xffffffffffffffff}) tee(r1, r2, 0x4, 0x3) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) [ 940.012881][T30839] Unknown ioctl 1074029061 [ 940.028144][T31020] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8109bbbd) 00:41:26 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffff9c, 0xae41, 0x2) ioctl$KVM_KVMCLOCK_CTRL(r2, 0xaead) socket$rxrpc(0x21, 0x2, 0x2) 00:41:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x500, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0xffff8000]}) 00:41:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9aa0a5d8) [ 940.220279][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 940.226158][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:41:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x600, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 940.290409][ C0] protocol 88fb is buggy, dev hsr_slave_0 [ 940.296264][ C0] protocol 88fb is buggy, dev hsr_slave_1 00:41:26 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x0, 0x49, &(0x7f0000000040)=[{}, {}], 0x0) io_destroy(r0) 00:41:26 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x7ffff3d, &(0x7f0000000040)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) io_getevents(r0, 0x8000, 0x5, &(0x7f00000000c0)=[{}, {}, {}, {}, {}], &(0x7f0000000180)={r2, r3+30000000}) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x81b1f603) 00:41:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9d614100) 00:41:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x700, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0xfffffdfd]}) 00:41:26 executing program 5: io_setup(0x80000000000003, &(0x7f0000000040)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000000)='/dev/dsp#\x00', 0x5, 0x0) ioctl$VIDIOC_G_JPEGCOMP(r1, 0x808c563d, &(0x7f0000000080)) openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm-control\x00', 0x40, 0x0) io_destroy(r0) munlockall() 00:41:26 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000000)={0x0, 0xffffffffffffff9c, 0x0, 0x135, &(0x7f00000000c0)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0xffffffffffffffff}, 0x30) getpgid(r2) r3 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x54e00, 0x0) ioctl$SIOCAX25DELFWD(r3, 0x89eb, &(0x7f0000000200)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast}) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) ioctl$KVM_KVMCLOCK_CTRL(r3, 0xaead) io_destroy(r0) 00:41:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9eaf4e0c) 00:41:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xa00, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:26 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x82496613) 00:41:26 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) r2 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='memory.stat\x00', 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000040)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r2, &(0x7f0000000100)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x4e24, 0x3f, @remote, 0x8de1}, r3}}, 0x30) 00:41:26 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) io_destroy(r0) 00:41:26 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xaa3, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:26 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x9f90d304) 00:41:26 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x1000000000000]}) 00:41:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x8422cade) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xc00, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:27 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000)='/dev/autofs\x00', 0x400, 0x0) ioctl$KVM_GET_REG_LIST(r1, 0xc008aeb0, &(0x7f0000000100)=ANY=[@ANYBLOB="040000000000000007000000000000008500000000000000ff0f0000000000000000000000000000ac00b7b2bf666e7b74970f89578309719b25f726c3faa21614b66db9233e3bade01cff0bff5dd435f43e113a2d9daa1181e3c8c6703d730df15f323f501b449fae56490dc03316a96735ebdb75c60d9b214f4d6cdc8d185b4bcb69a98387bf"]) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa020f436) 00:41:27 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000000)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_S_DV_TIMINGS(r1, 0xc0845657, &(0x7f0000000100)={0x0, @bt={0xffff, 0x5, 0x1, 0x1, 0xb9, 0x6, 0x7, 0x401, 0x1000, 0xf5, 0x40000000, 0x8, 0x400, 0x8, 0xe, 0x8}}) io_getevents(r0, 0x0, 0x1, &(0x7f00000000c0)=[{}, {}], 0x0) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) fcntl$setflags(r1, 0x2, 0x1) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_destroy(r0) ppoll(&(0x7f00000001c0)=[{r1, 0x12}, {r2, 0x122143697c4636a4}, {r2}, {r1, 0x2000}, {r1, 0x1}], 0x5, &(0x7f0000000200)={0x77359400}, &(0x7f0000000240), 0x8) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x1, 0x0) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xe00, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x80ffff00000000]}) 00:41:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa0bbedf9) 00:41:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x84553ad3) 00:41:27 executing program 5: r0 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_buf(r0, 0x107, 0x9, 0x0, &(0x7f00000004c0)) io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x480000, 0x0) r3 = syz_genetlink_get_family_id$team(&(0x7f0000000080)='team\x00') ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge_slave_1\x00', 0x0}) accept(r0, &(0x7f0000000100)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000180)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000001c0)={{{@in6=@mcast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@empty}}, &(0x7f00000002c0)=0xe8) accept4$packet(r0, &(0x7f0000000580)={0x11, 0x0, 0x0}, &(0x7f00000005c0)=0x14, 0x80800) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000600)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000000640)={'vcan0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000740)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@mcast2}}, &(0x7f0000000840)=0xe8) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x15, &(0x7f0000000940)={@ipv4={[], [], @multicast2}, 0x0}, &(0x7f0000000980)=0x14) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x27, &(0x7f00000009c0)={@initdev, @local, 0x0}, &(0x7f0000000a00)=0xc) sendmsg$TEAM_CMD_PORT_LIST_GET(r2, &(0x7f0000000d80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000d40)={&(0x7f0000000a40)={0x2d0, r3, 0x104, 0x70bd2c, 0x25dfdbfb, {}, [{{0x8, 0x1, r4}, {0xac, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x3}}}]}}, {{0x8, 0x1, r5}, {0x80, 0x2, [{0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0x5, 0x2, 0x2, 0x1f}, {0x7, 0x6, 0x7, 0x9}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r6}}}]}}, {{0x8, 0x1, r7}, {0x130, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r9}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}]}}, {{0x8, 0x1, r11}, {0x40, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r12}}}]}}]}, 0x2d0}}, 0x80) io_getevents(r1, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r1) 00:41:27 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000000)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0xf00, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa1d17c3b) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x2000, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:27 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x100000000000000]}) 00:41:27 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r2 = syz_open_dev$usb(&(0x7f0000000000)='/dev/bus/usb/00#/00#\x00', 0xd, 0x0) ioctl$UI_SET_PROPBIT(r2, 0x4004556e, 0x1) io_destroy(r0) 00:41:27 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x84719294) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x4800, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) [ 941.730271][ C1] protocol 88fb is buggy, dev hsr_slave_0 [ 941.730304][ C0] protocol 88fb is buggy, dev hsr_slave_1 [ 941.736111][ C1] protocol 88fb is buggy, dev hsr_slave_1 00:41:27 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa3634bdd) 00:41:27 executing program 5: io_setup(0x80000000000003, &(0x7f0000000000)=0x0) io_getevents(r0, 0x2, 0x0, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x4c00, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:27 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r1 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = request_key(&(0x7f0000000040)='.request_key_auth\x00', &(0x7f0000000140)={'syz', 0x2}, &(0x7f0000000180)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0xfffffffffffffffe) keyctl$get_persistent(0x16, r2, r3) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) io_destroy(r0) 00:41:27 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x5865, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x84a3f4f9) 00:41:28 executing program 5: io_setup(0x786, &(0x7f0000000080)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa3b481d5) 00:41:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0xfdfdffff00000000]}) 00:41:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6000, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:28 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$IP6T_SO_GET_REVISION_TARGET(r1, 0x29, 0x45, &(0x7f0000000000)={'NETMAP\x00'}, &(0x7f0000000040)=0x1e) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}]) io_destroy(r0) 00:41:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa48a91b7) 00:41:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x85328bf3) 00:41:28 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer2\x00', 0x200000, 0x0) r2 = socket$caif_stream(0x25, 0x1, 0x4) ioctl$LOOP_SET_FD(r1, 0x4c00, r2) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6558, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa4d5bf29) 00:41:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x80ffff]}) 00:41:28 executing program 4: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) socketpair(0x1f, 0x807, 0x2, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockname$ax25(r1, &(0x7f0000000140)={{0x3, @bcast}, [@rose, @default, @default, @bcast, @bcast, @null, @bcast, @null]}, &(0x7f00000001c0)=0x48) getsockopt$kcm_KCM_RECV_DISABLE(r1, 0x119, 0x1, &(0x7f0000000100), 0x4) r2 = memfd_create(&(0x7f0000000340)=':+lo#\x00`vo\xdc.\a8\xddA\xc9~\'\x06\xed\xd6\xb4\xb2\xf3_\x9dy\\\xb6\xe3b\x02\xdc\x87\xaed\xa8\xd0 X\xd8\xff\x19\teP0\xe1?6\a\xb1\xa7\xdd \x94D\xfe\xd0\x16\x7f\xc2\xce\x93\xf8i\xcce\x9d\xd8Nz\xe2\xab\xe6}\xdc\x95\xd4i\\\xc1\xf74\xe1\xeah\x7f\xce\xee,D\xcf\x0f\x9e`\xcfO\xd2\xf5\xb5Q\xdc\xbcr+\xfb\x9d[?\xa3\x9b)\xce$\xa9\xd8s$\xb4Ue6\xc4\x84\v\xb1\x87h\xc0\x18\xfbr\\\xb1\xf0\xbfs\xa3ng\xf0\x0f\x05\"2\xdf\x0f\xe5CKB\xd5\xf6\x16}\x97Q\xdf\r\xc9\x84\x12[O\xca\xe4\x04D\x88OM\xe2\xeb\x01\xb2\x9e\x81e\xb8A\xb3]\xc4\xc3\xbb\xa4\xbe<h\x83e`\xe2My\r\xf1\xca^\xd4\xec Qm~\xfb\x9c.o\xd0\xb2Y\x9c\xc8\x1fO\xb0\xdf\x13AI3\xac\v\xdf\x8a\xb1\x03', 0x0) io_submit(r0, 0x2000000000000193, &(0x7f0000000080)=[&(0x7f0000001100)={0x0, 0x0, 0x0, 0x5, 0x0, r2, 0x0}]) io_destroy(r0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000000)='trusted.overlay.nlink\x00', &(0x7f0000000040)={'U-', 0x401}, 0x28, 0x2) 00:41:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6800, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x85714ce3) 00:41:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x6c00, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa6092974) 00:41:28 executing program 5: io_setup(0x7, &(0x7f0000000100)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0x1000000]}) 00:41:28 executing program 0: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448e7838cdb4afdcebce4ab3ec158", 0xdd, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0x85ae107c) 00:41:28 executing program 2: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000080)={0x0, 0x7400, &(0x7f00000000c0)=[{&(0x7f0000000040)="2e0000001a008100a00f80ecdb4cb9040a4865160b000000d4126efb120003005200000040d819a9ffe200000000", 0x2e}], 0x1}, 0x0) 00:41:28 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='status\x00B#g9\xc1m\x17\xf9\r\xc2#\"\xc9O\x135 x^\x91\xea\x85\xae\x10|\xc3\x81\x98\x19\xc2cT\v\x1d\xe1\xba \x1em\xe4\xb7ZP\x11P\x91\xee\xd50\xaaH.6YF\x01\xce\xb5\xd1i\xc5\xba\xf4\x1b5\xd8\xa5\xa0\x9a\x82If\x13\xd8`#\x86[W\xef&\x9f\x90\xd3\x04\x96\x9fh}\xf5;a\x1b@\xa4B\x91\xb5\xa8\x82 \x8f\xbb\x83^T\xa4\x13\x10\xa3\xb4\x81\xd5\xbd\xbb\t\x81t)\t\xa6;|\xd1\xa1\x8d@^[\x01\x1b\xfb\xe5\xa4\xd5\xbf)\x94G\xe4\xc0\xddKc\xa3g!\x1c\x00x#\x8bP\x9daA\x00\xd3:U\x84\xaa;<\xb9\xb9\x9en_\x84q\x92\x94\xd4\x1b\'\x11|G\xfbO++\xe4u\xeb%\xd5\x01\x00\x00\x00\xcf\x84\"\xca\xdeW\f\b{\x03\xf6\xb1\x81\x8b\xc9pw\xdb#') add_key(0x0, 0x0, &(0x7f0000000500)="8e3d93d4ba8720df15e53835736408fffcb1e2bf0ce67379a641a6c5ef3c10ba3bb28dce943ec8eff3ce8b61d7a64323c93b2dca36f420a0f3af8107cbb0ec2be34c718553cfb220ded42cd35bdd76654239b54c5d2d605099b72f0e8d5d0548f57559bf56f7dfd8946096798fe45f0b9040d1bdcad55e3f797a862afb1aadd87a51edba0cc9cc0dd7e2235ff9edbba084a3f4f9db037e19ed004be2a96493efacc69704b7918aa485328bf35f0f1beaa6c8dd19d1f6887d93907658e5c7236a0dece8929eaf4e0c43731c8e31fb4448", 0xd0, 0x0) setgroups(0x442, &(0x7f0000000180)=[0x0, 0x0, 0x0, 0x0]) read$alg(r0, 0x0, 0xa641a6c5) [ 942.890747][ T493] validate_nla: 18 callbacks suppressed [ 942.890756][ T493] netlink: 'syz-executor.2': attribute type 3 has an invalid length. 00:41:28 executing program 5: io_setup(0x80000000000003, &(0x7f0000000300)=0x0) io_getevents(r0, 0x2, 0x2, &(0x7f0000d83f60)=[{}, {}], 0x0) io_destroy(r0) 00:41:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = eventfd(0x10000062) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000000)={r2, 0x0, 0x0, 0xffffffffffffffff, [0x0, 0xfdfdffff]}) [ 1100.050380][ T1040] INFO: task syz-executor.4:32748 blocked for more than 143 seconds. [ 1100.058679][ T1040] Not tainted 5.0.0+ #16 [ 1100.064873][ T1040] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 1100.074356][ T1040] syz-executor.4 D30032 32748 7860 0x00000004 [ 1100.080756][ T1040] Call Trace: [ 1100.084076][ T1040] __schedule+0x817/0x1cc0 [ 1100.088488][ T1040] ? trace_hardirqs_off+0x62/0x220 [ 1100.093688][ T1040] ? kasan_check_read+0x11/0x20 [ 1100.098608][ T1040] ? __sched_text_start+0x8/0x8 [ 1100.103518][ T1040] ? __lock_acquire+0x548/0x3fb0 [ 1100.108468][ T1040] schedule+0x92/0x180 [ 1100.112647][ T1040] schedule_timeout+0x8ca/0xfd0 [ 1100.117532][ T1040] ? wait_for_completion+0x294/0x440 [ 1100.122878][ T1040] ? find_held_lock+0x35/0x130 [ 1100.127640][ T1040] ? usleep_range+0x170/0x170 [ 1100.132397][ T1040] ? kasan_check_write+0x14/0x20 [ 1100.137346][ T1040] ? _raw_spin_unlock_irq+0x28/0x90 [ 1100.142609][ T1040] ? wait_for_completion+0x294/0x440 [ 1100.147879][ T1040] ? _raw_spin_unlock_irq+0x28/0x90 [ 1100.153122][ T1040] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1100.158389][ T1040] ? trace_hardirqs_on+0x67/0x230 [ 1100.163428][ T1040] ? kasan_check_read+0x11/0x20 [ 1100.168320][ T1040] wait_for_completion+0x29c/0x440 [ 1100.173509][ T1040] ? wait_for_completion_interruptible+0x4b0/0x4b0 [ 1100.180030][ T1040] ? wake_up_q+0xf0/0xf0 [ 1100.184323][ T1040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.190626][ T1040] ? kasan_check_read+0x11/0x20 [ 1100.195478][ T1040] __x64_sys_io_destroy+0x373/0x420 [ 1100.201604][ T1040] ? __x32_compat_sys_io_setup+0x410/0x410 [ 1100.207418][ T1040] ? do_syscall_64+0x26/0x610 [ 1100.212132][ T1040] ? lockdep_hardirqs_on+0x418/0x5d0 [ 1100.217436][ T1040] ? trace_hardirqs_on+0x67/0x230 [ 1100.222529][ T1040] do_syscall_64+0x103/0x610 [ 1100.227124][ T1040] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1100.233068][ T1040] RIP: 0033:0x457f29 [ 1100.237007][ T1040] Code: Bad RIP value. [ 1100.241134][ T1040] RSP: 002b:00007f74c1134c78 EFLAGS: 00000246 ORIG_RAX: 00000000000000cf [ 1100.249539][ T1040] RAX: ffffffffffffffda RBX: 0000000000000001 RCX: 0000000000457f29 [ 1100.257543][ T1040] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00007f74c1136000 [ 1100.265555][ T1040] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 1100.273573][ T1040] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f74c11356d4 [ 1100.281592][ T1040] R13: 00000000004bf100 R14: 00000000004d0a50 R15: 00000000ffffffff [ 1100.289552][ T1040] [ 1100.289552][ T1040] Showing all locks held in the system: [ 1100.297305][ T1040] 1 lock held by khungtaskd/1040: [ 1100.302380][ T1040] #0: 00000000b531fe51 (rcu_read_lock){....}, at: debug_show_all_locks+0x5f/0x27e [ 1100.311799][ T1040] 2 locks held by getty/7813: [ 1100.316469][ T1040] #0: 000000007f97dbce (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.325441][ T1040] #1: 0000000077332b9a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.335532][ T1040] 2 locks held by getty/7814: [ 1100.340263][ T1040] #0: 00000000c6d04daa (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.349214][ T1040] #1: 0000000055780456 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.358799][ T1040] 2 locks held by getty/7815: [ 1100.363492][ T1040] #0: 000000005c91fecb (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.372771][ T1040] #1: 000000002d80bc0b (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.382530][ T1040] 2 locks held by getty/7816: [ 1100.387195][ T1040] #0: 000000003c937f9c (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.396226][ T1040] #1: 00000000bd21e784 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.405819][ T1040] 2 locks held by getty/7817: [ 1100.410567][ T1040] #0: 0000000039271fe9 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.419531][ T1040] #1: 00000000130b7a9a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.429110][ T1040] 2 locks held by getty/7818: [ 1100.433819][ T1040] #0: 0000000061e589f4 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.442830][ T1040] #1: 00000000882e765d (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.452922][ T1040] 2 locks held by getty/7819: [ 1100.457591][ T1040] #0: 00000000577872b5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 1100.467176][ T1040] #1: 0000000071b9e4dc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x232/0x1b70 [ 1100.476855][ T1040] [ 1100.479189][ T1040] ============================================= [ 1100.479189][ T1040] [ 1100.487621][ T1040] NMI backtrace for cpu 0 [ 1100.492001][ T1040] CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.0.0+ #16 [ 1100.499185][ T1040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.509213][ T1040] Call Trace: [ 1100.512510][ T1040] dump_stack+0x172/0x1f0 [ 1100.516818][ T1040] nmi_cpu_backtrace.cold+0x63/0xa4 [ 1100.522070][ T1040] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1100.527682][ T1040] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 1100.533704][ T1040] arch_trigger_cpumask_backtrace+0x14/0x20 [ 1100.539587][ T1040] watchdog+0x9b7/0xec0 [ 1100.543769][ T1040] kthread+0x357/0x430 [ 1100.547819][ T1040] ? reset_hung_task_detector+0x30/0x30 [ 1100.553342][ T1040] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1100.559557][ T1040] ret_from_fork+0x3a/0x50 [ 1100.564046][ T1040] Sending NMI from CPU 0 to CPUs 1: [ 1100.569322][ C1] NMI backtrace for cpu 1 skipped: idling at native_safe_halt+0x2/0x10 [ 1100.570254][ T1040] Kernel panic - not syncing: hung_task: blocked tasks [ 1100.584423][ T1040] CPU: 0 PID: 1040 Comm: khungtaskd Not tainted 5.0.0+ #16 [ 1100.591605][ T1040] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1100.601867][ T1040] Call Trace: [ 1100.605221][ T1040] dump_stack+0x172/0x1f0 [ 1100.609589][ T1040] panic+0x2cb/0x65c [ 1100.613466][ T1040] ? __warn_printk+0xf3/0xf3 [ 1100.618047][ T1040] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 1100.623780][ T1040] ? printk_safe_flush+0xf2/0x140 [ 1100.628800][ T1040] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 1100.635076][ T1040] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 1100.640780][ T1040] ? nmi_trigger_cpumask_backtrace+0x1a7/0x236 [ 1100.646926][ T1040] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 1100.653149][ T1040] watchdog+0x9c8/0xec0 [ 1100.657295][ T1040] kthread+0x357/0x430 [ 1100.661357][ T1040] ? reset_hung_task_detector+0x30/0x30 [ 1100.666941][ T1040] ? kthread_cancel_delayed_work_sync+0x20/0x20 [ 1100.673170][ T1040] ret_from_fork+0x3a/0x50 [ 1100.678518][ T1040] Kernel Offset: disabled [ 1100.682840][ T1040] Rebooting in 86400 seconds..